{"id":5304,"date":"2014-06-23T15:33:06","date_gmt":"2014-06-23T19:33:06","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=5304"},"modified":"2025-06-18T15:47:19","modified_gmt":"2025-06-18T19:47:19","slug":"security-egit","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/","title":{"rendered":"Metadata Management: Asset Security in Git (Part 4 of 4)"},"content":{"rendered":"<p class=\"p1\"><em>This article is fourth in a 4-part series on managing metadata assets in\u00a0<a title=\"IRI Workbench Product Page\" href=\"http:\/\/www.iri.com\/products\/workbench\" target=\"_blank\" rel=\"noopener\">IRI Workbench<\/a>\u00a0using Git. It\u00a0focuses on the security of your metadata. Other articles in the series cover the use of Git as a\u00a0<a title=\"Metadata Management: Using EGit as an Asset Hub\" href=\"http:\/\/www.iri.com\/blog\/iri\/iri-workbench\/introduction-metadata-management-hub\/\">metadata asset hub<\/a>, for\u00a0<a title=\"Metadata Management: Version Control in EGit\" href=\"http:\/\/www.iri.com\/blog\/iri\/iri-workbench\/submission-version-control\/\">version control<\/a>, and for\u00a0tracking\u00a0<a title=\"Metadata Management: Lineage Tracking in EGit\" href=\"http:\/\/www.iri.com\/blog\/iri\/iri-workbench\/lineage-analysis-git\/\">metadata lineage<\/a>. See this <a href=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/sharing-iri-data-management-jobs-via-git\/\">newer article<\/a> on sharing IRI job assets in Git as well.<\/em><\/p>\n<p class=\"p1\"><span class=\"s1\"><br \/>\nImplementing metadata security protocols is essential for protecting both confidential job and data assets in enterprise development and production environments. Without them, there is no control over where these assets may end up, protection from deletion, or for how they could potentially be used (or misused). <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The Git metadata management system (hub), which IRI users can access in\u00a0<a href=\"http:\/\/www.iri.com\/products\/workbench\" target=\"_blank\" rel=\"noopener\">IRI Workbench<\/a>, offers\u00a0a number of ways\u00a0to\u00a0secure\u00a0metadata (and data) assets under its control, and in transit. The primary options are local, SSH (Secure Shell), and HTTP.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">These protocols can be specified as\u00a0remote repositories are introduced. Repositories hold current and prior\u00a0versions of your\u00a0projects\u00a0on the Internet or any other network. They provide flexibility in collaboration and user access rights,\u00a0asset <a title=\"Metadata Management: Version Control in EGit\" href=\"http:\/\/www.iri.com\/blog\/iri\/iri-workbench\/submission-version-control\/\">version control<\/a>, and <a title=\"Metadata Management: Lineage Tracking in EGit\" href=\"http:\/\/www.iri.com\/blog\/iri\/iri-workbench\/lineage-analysis-git\/\">lineage utilization<\/a>. They also provide the ability to secure the assets, and commit changes in\u00a0the remote repository.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The SSH security protocol is arguably the most common means of securing data transport, especially in a corporate network; anonymous access is not possible through it. Users must be authenticated through SSH in order to interact with the repository, even in a read-only manner. It\u2019s also an easy way to transfer data with encryption and authentication.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">To utilize this protocol through the Git integration plug-in for Eclipse and a Git hosting site, first generate a private key (RSA). This key is unique and locked, with a passphrase, and helps to identify you in an SSH server. In IRI Workbench, navigate to <em>Windows &gt; Preferences &gt; General &gt; Network Connections &gt; SSH2 &gt;&gt; Key Management<\/em>. Click on \u201cGenerate RSA Key\u201d and provide the passphrase. Make sure to copy this key, as it must be used later. Then save this private key in the .ssh folder.<\/span><\/p>\n<p class=\"p1\">\u00a0<a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.09.29-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5305\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.09.29-PM.png\" alt=\"Screen Shot 2014-06-20 at 12.09.29 PM\" width=\"541\" height=\"352\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.09.29-PM-300x196.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.09.29-PM-1024x669.png 1024w\" sizes=\"(max-width: 541px) 100vw, 541px\" \/><\/a><\/p>\n<p class=\"p1\"><span class=\"s1\">Next, create a remote repository. Sites such as GitHub, Bitbucket, and Unfuddle host Git repositories that can be utilized to simplify the process of managing remote repositories. For this demonstration, I will use BitBucket, since it provides free private repositories for up to five collaborators.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">With the creation of a Bitbucket account, navigate to \u201cManage account,\u201d under the person icon in the top right corner and in the column to the left under \u201cSecurity,\u201d and click \u201cSSH keys.\u201d Then add your key.\u00a0<\/span><\/p>\n<p class=\"p1\"><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.17.18-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5308\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.17.18-PM.png\" alt=\"Screen Shot 2014-06-20 at 12.17.18 PM\" width=\"525\" height=\"312\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.17.18-PM.png 2354w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.17.18-PM-300x177.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.17.18-PM-1024x607.png 1024w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<p class=\"p1\"><span class=\"s1\">To\u00a0create a repository, select the \u201cCreate\u201d button at the top of the page.<\/span><\/p>\n<p class=\"p1\"><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.50.40-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5306\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.50.40-PM.png\" alt=\"Screen Shot 2014-06-20 at 12.50.40 PM\" width=\"481\" height=\"384\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.50.40-PM.png 1268w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.50.40-PM-1024x815.png 1024w\" sizes=\"(max-width: 481px) 100vw, 481px\" \/><\/a><\/p>\n<p class=\"p1\"><span class=\"s1\">Now we must configure the settings for pushing and fetching commits to this remote repository. Navigate to the Git Repositories, view and right-click on \u201cRemote,\u201d and select \u201cPaste Repository Path.\u201d<\/span><\/p>\n<p class=\"p1\"><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.21.51-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5309\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.21.51-PM.png\" alt=\"Screen Shot 2014-06-20 at 12.21.51 PM\" width=\"509\" height=\"252\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.21.51-PM.png 1286w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.21.51-PM-300x148.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.21.51-PM-1024x506.png 1024w\" sizes=\"(max-width: 509px) 100vw, 509px\" \/><\/a><\/p>\n<p class=\"p1\"><span class=\"s1\">In the new window that appears, provide your Git SSH URL, in the form of \u201cssh:\/\/<a href=\"mailto:git@bitbucket.org\"><span class=\"s2\">git@bitbucket.org<\/span><\/a>\/<b>accountname<\/b>\/<b>reponame<\/b>.git\u201d and continue.<\/span><\/p>\n<p class=\"p1\"><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.51.36-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5310\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.51.36-PM.png\" alt=\"Screen Shot 2014-06-20 at 12.51.36 PM\" width=\"505\" height=\"510\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.51.36-PM.png 1044w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.51.36-PM-150x150.png 150w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.51.36-PM-296x300.png 296w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-12.51.36-PM-1012x1024.png 1012w\" sizes=\"(max-width: 505px) 100vw, 505px\" \/><\/a><\/p>\n<p class=\"p2\"><span class=\"s1\">Click \u201cNext\u201d for this window and then press \u201cFinish\u201d.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Now your remote repository is freely accessible in IRI Workbench to push files to and fetch metadata from, as well as other asset changes.<\/span><\/p>\n<p class=\"p1\"><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-1.02.05-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5311\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-1.02.05-PM.png\" alt=\"Screen Shot 2014-06-20 at 1.02.05 PM\" width=\"519\" height=\"145\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-1.02.05-PM.png 1288w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-1.02.05-PM-300x83.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/Screen-Shot-2014-06-20-at-1.02.05-PM-1024x286.png 1024w\" sizes=\"(max-width: 519px) 100vw, 519px\" \/><\/a><\/p>\n<p class=\"p1\"><span class=\"s1\">This is just one example of how to create a secure remote repository\u00a0where your metadata is safe to use and share. As you can see, the use of remote repositories is a convenient way to collaborate with other users and, with security protocols implemented, to help keep your metadata and other IRI job assets protected.<\/span><\/p>\n<p class=\"p1\">For more information on our metadata management series, you can review part one &#8211; Using Git as an <a title=\"Metadata Management: Using EGit as an Asset Hub\" href=\"http:\/\/www.iri.com\/blog\/iri\/iri-workbench\/introduction-metadata-management-hub\/\">Asset Hub<\/a>, part two &#8211; <a title=\"Metadata Management: Version Control in EGit\" href=\"http:\/\/www.iri.com\/blog\/iri\/iri-workbench\/submission-version-control\/\">Version Control<\/a>, and part three &#8211; <a title=\"Metadata Management: Lineage Tracking in EGit\" href=\"http:\/\/www.iri.com\/blog\/iri\/iri-workbench\/lineage-analysis-git\/\">Lineage Tracking<\/a>. Find out how Git provides a framework for metadata management in IRI Workbench.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article is fourth in a 4-part series on managing metadata assets in\u00a0IRI Workbench\u00a0using Git. It\u00a0focuses on the security of your metadata. Other articles in the series cover the use of Git as a\u00a0metadata asset hub, for\u00a0version control, and for\u00a0tracking\u00a0metadata lineage. See this newer article on sharing IRI job assets in Git as well. Implementing<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/\" title=\"Metadata Management: Asset Security in Git (Part 4 of 4)\">Read More<\/a><\/div>\n","protected":false},"author":44,"featured_media":11820,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[91,216,233],"tags":[1546,477,281,471,475],"class_list":["post-5304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iri-workbench","category-master-data-metadata-management","category-metadata-management","tag-git","tag-metadata-control-measures","tag-metadata-management-2","tag-metadata-repository","tag-metadata-security-protocols"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Metadata Management: Asset Security in Git (Part 4 of 4) - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Metadata Management: Asset Security in Git (Part 4 of 4)\" \/>\n<meta property=\"og:description\" content=\"This article is fourth in a 4-part series on managing metadata assets in\u00a0IRI Workbench\u00a0using Git. It\u00a0focuses on the security of your metadata. Other articles in the series cover the use of Git as a\u00a0metadata asset hub, for\u00a0version control, and for\u00a0tracking\u00a0metadata lineage. See this newer article on sharing IRI job assets in Git as well. ImplementingRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-23T19:33:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T19:47:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"399\" \/>\n\t<meta property=\"og:image:height\" content=\"228\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Allison Aguirre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Allison Aguirre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/\"},\"author\":{\"name\":\"Allison Aguirre\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/196d8057adb8838df5bddf4544beb507\"},\"headline\":\"Metadata Management: Asset Security in Git (Part 4 of 4)\",\"datePublished\":\"2014-06-23T19:33:06+00:00\",\"dateModified\":\"2025-06-18T19:47:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/\"},\"wordCount\":642,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg\",\"keywords\":[\"Git\",\"metadata control measures\",\"metadata management\",\"metadata repository\",\"metadata security protocols\"],\"articleSection\":[\"IRI Workbench\",\"MDM\",\"Metadata Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/\",\"url\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/\",\"name\":\"Metadata Management: Asset Security in Git (Part 4 of 4) - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg\",\"datePublished\":\"2014-06-23T19:33:06+00:00\",\"dateModified\":\"2025-06-18T19:47:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg\",\"width\":399,\"height\":228,\"caption\":\"locked folder\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Metadata Management: Asset Security in Git (Part 4 of 4)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/196d8057adb8838df5bddf4544beb507\",\"name\":\"Allison Aguirre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0210c89c4e232a0c94809253910d4226?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0210c89c4e232a0c94809253910d4226?s=96&d=blank&r=g\",\"caption\":\"Allison Aguirre\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/allisona\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Metadata Management: Asset Security in Git (Part 4 of 4) - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/","og_locale":"en_US","og_type":"article","og_title":"Metadata Management: Asset Security in Git (Part 4 of 4)","og_description":"This article is fourth in a 4-part series on managing metadata assets in\u00a0IRI Workbench\u00a0using Git. It\u00a0focuses on the security of your metadata. Other articles in the series cover the use of Git as a\u00a0metadata asset hub, for\u00a0version control, and for\u00a0tracking\u00a0metadata lineage. See this newer article on sharing IRI job assets in Git as well. ImplementingRead More","og_url":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/","og_site_name":"IRI","article_published_time":"2014-06-23T19:33:06+00:00","article_modified_time":"2025-06-18T19:47:19+00:00","og_image":[{"width":399,"height":228,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg","type":"image\/jpeg"}],"author":"Allison Aguirre","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Allison Aguirre","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/"},"author":{"name":"Allison Aguirre","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/196d8057adb8838df5bddf4544beb507"},"headline":"Metadata Management: Asset Security in Git (Part 4 of 4)","datePublished":"2014-06-23T19:33:06+00:00","dateModified":"2025-06-18T19:47:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/"},"wordCount":642,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg","keywords":["Git","metadata control measures","metadata management","metadata repository","metadata security protocols"],"articleSection":["IRI Workbench","MDM","Metadata Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/","url":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/","name":"Metadata Management: Asset Security in Git (Part 4 of 4) - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg","datePublished":"2014-06-23T19:33:06+00:00","dateModified":"2025-06-18T19:47:19+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg","width":399,"height":228,"caption":"locked folder"},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/security-egit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Metadata Management: Asset Security in Git (Part 4 of 4)"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/196d8057adb8838df5bddf4544beb507","name":"Allison Aguirre","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0210c89c4e232a0c94809253910d4226?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0210c89c4e232a0c94809253910d4226?s=96&d=blank&r=g","caption":"Allison Aguirre"},"url":"https:\/\/www.iri.com\/blog\/author\/allisona\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/06\/locked-folder.jpg","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/5304"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=5304"}],"version-history":[{"count":31,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/5304\/revisions"}],"predecessor-version":[{"id":18445,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/5304\/revisions\/18445"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/11820"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=5304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=5304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=5304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}