Using Security Management, you can group users to simplify administration. User groups logically connect permissions to many users in a single operation. For example, if you define 50 users to the user group PRJTX, and PRJTX has permission to access Event message records, then all 50 users are automatically granted access to Event message records.
In addition, because CA NSM recognizes that a user may belong to more than one user group, your organization can define security from a variety of perspectives. For example, you could define the user USER01 to the following user groups:
|
User Group |
Description |
|---|---|
|
PRJTX |
Project X Development Team |
|
LAB |
Laboratory Team |
|
PLANNING |
Planning Analyst |
|
HRSAPPL |
Human Resource Systems |
|
CLSIFIED |
Clearance is Classified |
USER01 has access to any CA NSM management component permitted to any of these user groups. This example illustrates that permissions can be logically assigned, based on USER01’s department (PRJTX), the user’s area within the department (LAB), or specific title (PLANNING). You can also base access on the application on which the user works (HRSAPPL), or even the information clearance level assigned to the user (CLSIFIED).
User groups exemplify the power of the Security Management architecture. If USER01 is promoted, changes jobs, or changes departments, permissions can be adjusted automatically by changing the user groups of which the user is a member.
Note: For instructions about defining your users, see Defining User Groups in the online CA Procedures.
|
Copyright © 2010 CA.
All rights reserved.
|
|