In Phase 3, you create security rules for users, user groups, access permissions, and asset groups in WARN mode and verify user access, adjusting rules based on results, then re‑execute the commit process.
With the System Violation Mode set to WARN, you can test all of the rules you have defined and refine and adjust those rules without risk of impacting your users’ ability to work.
Note: For instructions about configuring your system to operate in WARN mode, see Setting Options for Production, WARN Mode in the online CA Procedures.
Complete the procedures referenced in the rest of this section to create security rules for the following:
|
Copyright © 2010 CA.
All rights reserved.
|
|