Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

IBM Case Manager - Configure Security

( Duration: 2 Days )

In IBM Case Manager - Configure Security training course, you will learn to configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.

By attending IBM Case Manager - Configure Security workshop, delegates will learn to:

  • Configure security in an IBM Case Manager development environment.
  • Create a security configuration package file.
  • Export a solution and a security configuration package file to a new environment.
  • Use a security configuration to apply security settings in a new environment.
  • Customize security settings.

  • Knowledge of Case Manager concepts, such as case management, case, solution, task
  • Ability to build, validate, deploy, and test solutions.

  • This IBM Case Manager - Configure Security is meant for system administrators who maintain IBM Case Manager environments and for solution architects who must plan security requirements for their solutions.

COURSE AGENDA

1

Overview of Security Deployment

  • Describe the process for deploying a security configuration.
  • Identify the security goals for each environment type
2

Work with project areas

  • Create a project area
  • Add users to a project area
3

Manage access to cases

  • Describe object security in a target object store
  • Create roles for a case
  • Create an in-basket for all assigned work
  • Assign users to case teams
4

Create a Security Configuration

  • Create a security configuration
  • Edit security configuration permissions
  • Apply a security configuration to a solution
5

Configure Target Object Store Security

  • Organize users and groups for target object store access
6

Configure Deployed Solution Security

  • Package and export a solution
  • Import a solution to a new environment
  • Apply a solution configuration
7

Customize a Privilege Definition

  • Create a custom privilege definition
  • Apply a custom privilege definition to a security configuration
8

Use Security Proxies

  • Describe a security proxy scenario
  • Use a security proxy to modify permissions on a case
  • Describe how to transfer a solution with security proxies to a new environment

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X