Policy Server Guides › Policy Server Configuration Guide › Implementing Policy-based Security › Security Model Implementation
Security Model Implementation
To implement a security model that best meets the needs of your organization, you may create security policies using information gathered in the design phases shown and described below.
- Organization and resource requirementsset the basic objective of the security model and identify the resources.
- Task assessment requirementsidentify users and roles, and link the roles to tasks.
- Access control requirementsestablish access requirements for users based on their role requirements.
Authorization models based only on access control lists (ACLs) end at this point.
- Implementation requirementsdefine how the access is implemented (in terms of how users are tracked and how content is personalized for users) and how user sessions are managed.
Authorization models based on SiteMinder security policies incorporate both access control and implementation models.