Previous Topic: ExampleNext Topic: Initialization Parameters


External Security

The sections that follow demonstrate how to implement external security for the following security managers:

Because of the way that CA Deliver handles security, you cannot see any violations logged by the external security manager. CA Deliver preapproves users for access to resources. That is, before displaying a panel, CA Deliver checks for everything a user is allowed to do or see on that panel.

It is impossible for a violation to occur in this environment and, therefore, none are logged. For example, if a user who is authorized to the Report function requests a list of reports, the only reports displayed are those permitted for that user. If no reports are permitted, an empty list is displayed.

Note: Because the CA Deliver external security processing verifies the user's authorization for every object requested, you can minimize the impact on performance by using a wildcard character to request only specific data. For example, if you enter J to display all jobs, performance is impacted. You can improve performance by entering J ABC* to view only those jobs that begin with ABC.

The implementation procedures presented in this section are examples only. You must determine the appropriate settings for your environment.

Important! These examples authorize all users to do everything. We recommend that the CA Deliver administrator work together with a security administrator to do the implementation as a cooperative effort.