When completing each phase of the security model design methodology, use a table similar to the one shown below to organize your information. Once you have completed the columns in this table, you can use the information to build SiteMinder security policies.
|
Resource |
Role |
Task |
Access |
Implementation |
|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The following sections describe how to gather information to complete this table.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |