Previous Topic: Security Model Implementation

Next Topic: Organization and Resource Requirement Considerations

Organize Security Model Requirements

When completing each phase of the security model design methodology, use a table similar to the one shown below to organize your information. Once you have completed the columns in this table, you can use the information to build SiteMinder security policies.

Resource

Role

Task

Access

Implementation

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Copyright © 2010 CA. All rights reserved. Email CA about this topic