Previous Topic: Delete Application MappingsNext Topic: Install the CA EEM Security Certificate and Configure the EEM Host Property


Configuring Users and Role-Based Security

This section describes how to configure and manage users, user groups, policies, and security privileges. Perform these tasks from the Administration panel Access Management tab and in Embedded Entitlements Manager (CA EEM). You can integrate and start CA EEM in the context of CA Configuration Automation.

CA EEM provides the user management and resource access control. CA Configuration Automation adds users that are defined in CA EEM to product-specific user groups with configurable privileges and access levels.

The access privileges determine the data users can access, how the data is presented, and what actions users can perform.

Note: For more information about installing CA EEM to integrate with CA Configuration Automation, see the Implementation Guide. For more information about the CA EEM functionality, see the CA EEM documentation, including the Online Help.