

Administer Advanced CA EEM Security › Touchpoint Security with CA EEM
Touchpoint Security with CA EEM
The purpose of Touchpoint Security is to limit access to business-critical hosts or hosts with highly sensitive information to a group of high-privileged users.
This section applies only if you have enabled Touchpoint Security for touchpoints in one or more environments.
- To determine whether Touchpoint Security is enabled on touchpoints mapped to candidate hosts, review the Touchpoint Security configuration in the touchpoint properties. If it is marked Inherit from Environment, consider changing the configuration to Enabled.
- To determine whether a specific touchpoint mapped to a host that needs protection is protected, review the filters in the Touchpoint Security policies.
More information:
Configure Domain Properties
Configure Environment Properties
Configure Properties for the Design Touchpoint
Configure Orchestrator Touchpoint Properties
Approach to Configuring Touchpoint Security
Copyright © 2014 CA.
All rights reserved.
 
|
|