Previous Topic: How Sessions Are Managed

Next Topic: Organize Security Model Requirements

Security Model Implementation

To implement a security model that best meets the needs of your organization, you may create security policies using information gathered in the design phases shown and described below.

The design phase of a security model

  1. Organization and resource requirements—set the basic objective of the security model and identify the resources.
  2. Task assessment requirementsidentify users and roles, and link the roles to tasks.
  3. Access control requirementsestablish access requirements for users based on their role requirements.

    Authorization models based only on access control lists (ACLs) end at this point.

  4. Implementation requirementsdefine how the access is implemented (in terms of how users are tracked and how content is personalized for users) and how user sessions are managed.

    Authorization models based on SiteMinder security policies incorporate both access control and implementation models.

More information:

Organization and Resource Requirement Considerations

Define Task-Assessment Requirements


Copyright © 2010 CA. All rights reserved. Email CA about this topic