Previous Topic: Security Scenario - Software DeliveryNext Topic: How Security Is Set Up


Configuring Common Security

Configuring security is one of the crucial steps after installation, as it provides the gateway to the CA Client Automation system. You can decide the security model that suits your organization and set up the security system accordingly. Decision on the security model can be made based on the following factors:

Note: If a user has two profiles, one mapped to his user account and the other mapped to a group, then the resulting permissions is the union of permissions in both the profiles. This rule is also valid, if a user is member of several groups which are defined as security profiles.

By default, the members of the administrators group are granted full access control. So, once the installation of CA Client Automation is complete, any member of the administrators group can login to the DSM domain and create further users and grant access rights.