Previous Topic: Configuring Common SecurityNext Topic: Add Security Profile


How Security Is Set Up

Setting up security-controlled access to the system involves the following tasks. Understanding these tasks helps you set up a powerful and efficient security system.

However, to fine tune the security system further, you can do the following:

Any operating system user with a valid account on the domain manager can connect to the system, that is, a user need not be an Administrator anymore. Access to system features and functions is controlled by its internal security mechanisms. By default, Administrators and the owner get full access, everyone else gets No Access. However, you can change access rights by updating the permissions after installation.

Note: If you are connected to the enterprise manager, ensure that you have an account with sufficient user rights (or user group rights) for accessing the security functions on each downstream domain manager. If you are connected to a domain manager, ensure that you have an account with sufficient rights for accessing the security functions on the enterprise manager.