Previous Topic: Define Implementation Requirements

Next Topic: Access Roles in Identity Manager

How Role-Based Access Control Is Implemented

In addition to creating access control policies based on users or groups, you can implement access control based on roles. If you have purchased CA Identity Manager (formerly IdentityMinder), you can create roles and assign roles to users and groups. For more information, see the CA Identity Manager Operations Guide.

More information:

Access Roles in Identity Manager

Identity Manager Environment Objects

Overview

Strategies for Managing Security and Users

How a Security Model Is Established