Loading

 Services  

  IBM FileNet P8
    5.5
   
  IBM Case Foundation
    5.2.1
   
  IBM Case Manager
    5.3.2
    5.2
   
  IBM Content Navigator
    3.0.6
    2.0.3.6
   
  IBM Enterprise Records
    5.1
   
  IBM Datacap
    9.1.7
    9.0.1
   
   
   
   
 
 
IBM Case Manager 5.3.2: Configure IBM Case Manager Security - F2920G (1.0 Day)

In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.
Pre-requisites:
  • Knowledge of Case Manager concepts, such as case management, case, solution, task.
  • Ability to build, validate, deploy, and test solutions.
  • or Build an IBM Case Manager Solution V5.3.2(F2910G)

Delivery Type: Classroom (Hands-on labs) Course Type: Public or Private on-site
Course Topics:
       Overview of security deployment
  • Describe the process for deploying a security configuration.
  • Identify the security goals for each environment type
       Work with project areas
  • Create a project area
  • Add users to a project area
       Manage access to cases
  • Describe object security in a target object store
  • Create roles for a case
  • Create an in-basket for all assigned work
  • Assign users to case teams
       Create a security configuration
  • Create a security configuration
  • Edit security configuration permissions
  • Apply a security configuration to a solution
       Configure target object store security
  • Organize users and groups for target object store access
       Configure deployed solution security
  • Package and export a solution
  • Import a solution to a new environment
  • Apply a solution configuration
       Customize a privilege definition
  • Create a custom privilege definition
  • Apply a custom privilege definition to a security configuration
       Use security proxies
  • Describe a security proxy scenario
  • Use a security proxy to modify permissions on a case
  • Describe how to transfer a solution with security proxies to a new environment