Previous Topic: Create the Web Portal RolesNext Topic: Identify the Application that Needs Protecting


Application Security Policies Based on Roles

In this use case, a financial services company, acme-financial.com, has an internal human resources application that handles benefits and performance management. All employees should have access to the benefits portion of the application while only managers should be permitted access to the performance management portion.

The following procedures detail how you can use the EPM model together with application roles to create a security policy for the human resources application.

Given:

Solution for application security based on roles:

To solve this use case, you complete the following steps:

  1. Create an attribute directory mapping for the user directory.
  2. Create an application.
  3. Select the user directory where you locate the users that meet the role criteria.
  4. Specify the resources that are the sub-components of the main application.
  5. Define the two roles that should have access to the application.
  6. Combine the resources and roles into an application policy.