Setting up security-controlled access to the system involves the following tasks. Understanding these tasks helps you set up a powerful and efficient security system.
Make sure that you restrict profiles from changing access rights to security profiles, security areas and class permissions object classes. Open the profiles and set their class permission access type to No Access for these three object classes.
However, to fine tune the security system further, you can do the following:
Any operating system user with a valid account on the domain manager can connect to the system, that is, a user need not be an Administrator anymore. Access to system features and functions is controlled by its internal security mechanisms. By default, Administrators and the owner get full access, everyone else gets No Access. However, you can change access rights by updating the permissions after installation.
Note: If you are connected to the enterprise manager, ensure that you have an account with sufficient user rights (or user group rights) for accessing the security functions on each downstream domain manager. If you are connected to a domain manager, ensure that you have an account with sufficient rights for accessing the security functions on the enterprise manager.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|