When completing each phase of the security model design methodology, use a table similar to the one shown below to organize your information. Once you have completed the columns in this table, you can use the information to build SiteMinder security policies.
Resource |
Role |
Task |
Access |
Implementation |
---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Copyright © 2010 CA. All rights reserved. | Email CA about this topic |