Previous Topic: CA Access Control Database Size Limitation

Next Topic: CA Access Control Enterprise Management Deployment Architectures


How to Implement CA Access Control Enterprise Management

Before you implement CA Access Control Enterprise Management in your enterprise, you should understand which components to install, in what order, and where to install them. Observe the following guidelines when you implement an enterprise deployment of CA Access Control Enterprise Management:

Use the following process to implement CA Access Control Enterprise Management:

  1. Decide which deployment architecture to use
  2. Install a supported RDBMS as the central database
  3. (Optional) Install a supported user store
  4. Install the Enterprise Management Server
  5. Implement Enterprise Reporting
  6. (Optional) Integrate with CA User Activity Reporting Module
  7. Install the endpoints

The following diagram illustrates the implementation process for CA Access Control Enterprise Management:

Implementing the Enterprise Management Server

Use this diagram to help you implement the Enterprise Management Server:

This diagram illustrated ho you implement the Enterprise Management Server:

Note: The dashed lines represent optional steps.

Implementing CA Access Control for Disaster Recovery

Use the following diagram to help you implement CA Access Control for disaster recovery:

The following diagram illustrates how to implement CA Access Control for Disaster Recovery: