Previous Topic: Delete Data Extraction Profiles or Data Snapshots

Next Topic: Security

About Security & Permissions

Corporate security has immense ramifications, especially when you consider the potential harm that could result from loss, alteration by unauthorized users, or misuse of data and resources. It is important that the software operates at a level of security that is consistent with the prevention of such potential harm.

The CA RCM Portal is accessible to both senior administrators and regular users. The different types of users have different needs and system usage. The CA RCM Portal has a comprehensive, Role-based, security and permissions structure aimed at ease-of-use on one hand, and maintaining appropriate security on the other hand.

This chapter discusses security issues and solutions of the CA RCM portal, both on the general level and on the user level.

This section contains the following topics:

Security

Permissions