Previous Topic: View Security Object Performance Data in the Time Series FacilityNext Topic: Identify the Missing Role


Manage Users

How to Identify and Correct an Access Rights Problem

As a security administrator, modifying access rights for resources within your scope is a task that you regularly perform. This task is important because it:

This example describes how you can use CA Chorus and CA Top Secret to identify and correct an access rights problem, and then verify that you have corrected the problem.

This illustration shows each of the steps the Security Administrator needs to perform to identify and correct an access rights problem.

In this example, you have just received a service desk ticket with the following information:

Your research indicates that the employee needs read access to a particular data set.

Perform these tasks to identify and correct the access problem:

  1. Identify the missing role.
  2. Modify access rights.
  3. Verify the New Access.