IBM FileNet Content Manager 5.2.1 - Security





  • Resolve logon failures
  • Verify object store access
  • Change security on a document
  • Change the owner of a document
  • Customize document access
  • Configure object store security
  • Configure class and property security
  • Configure security inheritance
  • System Administrators who are responsible for:
    • Maintaining the IBM FileNet Content Manager domains.
    • Administering development and production environments.
  • Basic computer skills: Able to use computers, authenticate using a name and password, follow hyperlinks, and use common user interface elements such as buttons, menus, and tabs.
  • Able to use IBM Content Navigator for typical content management tasks, including navigating object stores, downloading and uploading documents, checking in and checking out.
  • Able to administer IBM Content Navigator, including configuring desktops.
  • Recommended prerequisite courses:
    • IBM Content Navigator Administration (F271G)
    • IBM FileNet Content Manager 5.2.1: Introduction (F280G)
    • IBM FileNet Content Manager 5.2.1: Build a FileNet Content Repository (F281G)
    • IBM FileNet Content Manager 5.2.1: Work with object metadata (F282G)
  • Resolve access issues
    • Security in the IBM FileNet P8 domain
    • Authentication
    • Authorization
    • Security principals
    • Users and groups
    • Security realms
    • IBM Content Navigator Desktop
    • Login Errors
  • Modify direct security
    • Permissions
    • Security sources
    • Security sources and order of evaluation
    • What is direct security?
    • Access control from IBM Content Navigator
    • Access control in Administration Console
    • Permission groups
    • Ownership
  • Configure object store security
    • Required accounts
    • Configure object store administrators and users
    • Example security scenario
    • Overview of initial security configuration
    • Super groups
    • Security Script Wizard
    • Root folder security
  • Configure class and property security
    • Default instance security
    • Setting default instance security
      Property modification security
    • Configure property modification access
    • System property modification
  • Configure security inheritance
    • Overview of security inheritance
    • Definition of terms
    • Security inheritance architecture
    • Characteristics of inherited permissions
    • Methods for configuring security inheritance
    • Use a security folder
    • Use an object as a security proxy
    • Guidelines

Inscription au cours