Previous Topic: How Sessions Are Managed

Next Topic: How a Security Model Requirements Table Is Created

How a Security Model Is Established

To implement a security model that best meets the needs of your organization, you may create security policies using information gathered in the design phases shown and described below.

  1. Organization and resource requirements—set the basic objective of the security model and identify the resources.
  2. Task assessment requirementsidentify users and roles, and link the roles to tasks.
  3. Access control requirementsestablish access requirements for users based on their role requirements.

    Authorization models based only on access control lists (ACLs) end at this point.

  4. Implementation requirementsdefine how the access is implemented (in terms of how users are tracked and how content is personalized for users) and how user sessions are managed.

    Authorization models based on SiteMinder security policies incorporate both access control and implementation models.

More information:

How Organization and Resource Requirements Are Established

Define Task-Assessment Requirements