- Configure security in an IBM Case Manager development environment.
- Create a security configuration package file.
- Export a solution and a security configuration package file to a new environment.
- Use a security configuration to apply security settings in a new environment.
- Customize security settings.
This course is for system administrators who maintain IBM Case Manager environments and for solution architects who must plan security requirements for their solutions.
â¢ Knowledge of Case Manager concepts, such as case management, case, solution, task.
â¢ Ability to build, validate, deploy, and test solutions.
â¢ or Build an IBM Case Manager Solution V5.3.2 (classroom)(F2910G)
â¢ or Build an IBM Case Manager SolutionV5.3.2 (self-paced)(F2919G)
Unit 1 Overview of security deployment
â¢ Describe the process for deploying a security configuration.
â¢ Identify the security goals for each environment type
Unit 2 Work with project areas
â¢ Create a project area
â¢ Add users to a project area
Unit 3 Manage access to cases
â¢ Describe object security in a target object store
â¢ Create roles for a case
â¢ Create an in-basket for all assigned work
â¢ Assign users to case teams
Unit 4 Create a security configuration
â¢ Create a security configuration
â¢ Edit security configuration permissions
â¢ Apply a security configuration to a solution
Unit 5 Configure target object store security
â¢ Organize users and groups for target object store access
Unit 6 Configure deployed solution security
â¢ Package and export a solution
â¢ Import a solution to a new environment
â¢ Apply a solution configuration
Unit 7 Customize a privilege definition
â¢ Create a custom privilege definition
â¢ Apply a custom privilege definition to a security configuration
Unit 8 Use security proxies
â¢ Describe a security proxy scenario
â¢ Use a security proxy to modify permissions on a case
â¢ Describe how to transfer a solution with security proxies to a new environment
Unit A Automate case security changes
â¢ Describe a scenario for automating security changes
â¢ Use a FileNet workflow to change permissions on a case by using a security proxy
Unit B Additional security configurations
â¢ Analyze scenarios that require specific security customizations