|
|
|
|
IBM FileNet Content Manager 5.2.1: Security - F283G (0.5 Day)
|
|
Learn to administer security on an IBM FileNet Content Manager 5.2.1 system. This comprehensive security course covers directly modifying security, to configuring security on an object store and its objects.
|
Delivery Type: |
Classroom (Hands-on labs) |
Course Type: |
Public or Private on-site |
Pre-requisites: |
- Basic computer skills: Able to use computers, authenticate using a name and password, follow hyperlinks, and use common user interface elements such as buttons, menus, and tabs.
- Able to use IBM Content Navigator for typical content management tasks, including navigating object stores, downloading and uploading documents, checking in and checking out.
- Able to administer IBM Content Navigator, including configuring desktops.
- Recommended prerequisite courses:
- IBM Content Navigator 2.0.3.6: Administration (F271G)
- IBM FileNet Content Manager 5.2.1: Introduction (F280G)
- IBM FileNet Content Manager 5.2.1: Build a FileNet Content Repository (F281G)
- IBM FileNet Content Manager 5.2.1: Work with object metadata (F282G)
|
Course Topics: |
Resolve access issues
- Security in the IBM FileNet P8 domain
- Authentication
- Authorization
- Security principals
- Users and groups
- Security realms
- IBM Content Navigator Desktop
- Login Errors
Modify direct security
- Permissions
- Security sources
- Security sources and order of evaluation
- What is direct security?
- Access control from IBM Content Navigator
- Access control in Administration Console
- Permission groups
- Ownership
Configure object store security
- Required accounts
- Configure object store administrators and users
- Example security scenario
- Overview of initial security configuration
- Super groups
- Security Script Wizard
- Root folder security
Configure class and property security
- Default instance security
- Setting default instance security
Property modification security
- Configure property modification access
- System property modification
Configure security inheritance
- Overview of security inheritance
- Definition of terms
- Security inheritance architecture
- Characteristics of inherited permissions
- Methods for configuring security inheritance
- Use a security folder
- Use an object as a security proxy
- Guidelines
|
|
|