Loading

 Services  

  IBM FileNet P8
    5.5
    5.2.1
    5.2
    5.1
   
  IBM Case Foundation
    5.2.1
   
  IBM Case Manager
    5.3.2
    5.2
    5.1
   
  IBM Content Navigator
    3.0.6
    2.0.3.6
    2.0.2
   
  IBM Enterprise Records
    5.1
   
  IBM Datacap
    9.0.1
    9.0
    8.1
   
  IBM FileNet Image Services
   
   
   
 
 
IBM FileNet Content Manager 5.2.1: Security - F283G (0.5 Day)

Learn to administer security on an IBM FileNet Content Manager 5.2.1 system. This comprehensive security course covers directly modifying security, to configuring security on an object store and its objects.


Delivery Type: Classroom (Hands-on labs) Course Type: Public or Private on-site
Pre-requisites:
  • Basic computer skills: Able to use computers, authenticate using a name and password, follow hyperlinks, and use common user interface elements such as buttons, menus, and tabs.
  • Able to use IBM Content Navigator for typical content management tasks, including navigating object stores, downloading and uploading documents, checking in and checking out.
  • Able to administer IBM Content Navigator, including configuring desktops.
  • Recommended prerequisite courses:
    • IBM Content Navigator 2.0.3.6: Administration (F271G)
    • IBM FileNet Content Manager 5.2.1: Introduction (F280G)
    • IBM FileNet Content Manager 5.2.1: Build a FileNet Content Repository (F281G)
    • IBM FileNet Content Manager 5.2.1: Work with object metadata (F282G)


Course Topics:
        Resolve access issues
  • Security in the IBM FileNet P8 domain
  • Authentication
  • Authorization
  • Security principals
  • Users and groups
  • Security realms
  • IBM Content Navigator Desktop
  • Login Errors
        Modify direct security
  • Permissions
  • Security sources
  • Security sources and order of evaluation
  • What is direct security?
  • Access control from IBM Content Navigator
  • Access control in Administration Console
  • Permission groups
  • Ownership
        Configure object store security
  • Required accounts
  • Configure object store administrators and users
  • Example security scenario
  • Overview of initial security configuration
  • Super groups
  • Security Script Wizard
  • Root folder security
        Configure class and property security
  • Default instance security
  • Setting default instance security
    Property modification security
  • Configure property modification access
  • System property modification
        Configure security inheritance
  • Overview of security inheritance
  • Definition of terms
  • Security inheritance architecture
  • Characteristics of inherited permissions
  • Methods for configuring security inheritance
  • Use a security folder
  • Use an object as a security proxy
  • Guidelines