|
|
|
|
IBM Case Manager 5.3.2: Configure IBM Case Manager Security - F2920G (1.0 Day)
|
|
In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.
|
Pre-requisites: |
- Knowledge of Case Manager concepts, such as case management, case, solution, task.
- Ability to build, validate, deploy, and test solutions.
- or Build an IBM Case Manager Solution V5.3.2(F2910G)
|
Delivery Type: |
Classroom (Hands-on labs) |
Course Type: |
Public or Private on-site |
Course Topics: |
Overview of security deployment
- Describe the process for deploying a security configuration.
- Identify the security goals for each environment type
Work with project areas
- Create a project area
- Add users to a project area
Manage access to cases
- Describe object security in a target object store
- Create roles for a case
- Create an in-basket for all assigned work
- Assign users to case teams
Create a security configuration
- Create a security configuration
- Edit security configuration permissions
- Apply a security configuration to a solution
Configure target object store security
- Organize users and groups for target object store access
Configure deployed solution security
- Package and export a solution
- Import a solution to a new environment
- Apply a solution configuration
Customize a privilege definition
- Create a custom privilege definition
- Apply a custom privilege definition to a security configuration
Use security proxies
- Describe a security proxy scenario
- Use a security proxy to modify permissions on a case
- Describe how to transfer a solution with security proxies to a new environment
|
|
|