F2920G  IBM Case Manager: Configure Security (v5.3.2)

Duração:     1 Dia

Nível:           Intermédio

Audiência:   Business Analyst

PRÓXIMAS SESSÕES
Início (AAAA-MM-DD) Fim (AAAA-MM-DD) Língua Preço
2023-11-10 2023-11-10 Português 800 EUR 1409
2023-11-24 2023-11-24 Português 800 EUR 1423
2023-12-08 2023-12-08 Português 800 EUR 1437
2023-12-22 2023-12-22 Português 800 EUR 1451
2024-01-19 2024-01-19 Português 800 EUR 1479
2024-02-02 2024-02-02 Português 800 EUR 1493
2024-02-16 2024-02-16 Português 800 EUR 1507
2024-03-01 2024-03-01 Português 800 EUR 1521
2024-03-15 2024-03-15 Português 800 EUR 1535
2024-03-29 2024-03-29 Português 800 EUR 1549
2024-04-12 2024-04-12 Português 800 EUR 1563
2024-04-26 2024-04-26 Português 800 EUR 1577
2024-05-10 2024-05-10 Português 800 EUR 1591
2024-05-24 2024-05-24 Português 800 EUR 1605
2024-06-07 2024-06-07 Português 800 EUR 1619
2024-06-21 2024-06-21 Português 800 EUR 1633
SÍNTESE

In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.

PREREQUISITOS

   • Knowledge of Case Manager concepts, such as case management, case, solution, task.
   • Ability to build, validate, deploy, and test solutions.
   • or Build an IBM Case Manager Solution V5.3.2 (classroom)(F2910G)
   • or Build an IBM Case Manager SolutionV5.3.2 (self-paced)(F2919G)

  • Configure security in an IBM Case Manager development environment.
  • Create a security configuration package file.
  • Export a solution and a security configuration package file to a new environment.
  • Use a security configuration to apply security settings in a new environment.
  • Customize security settings.

Unit 1 Overview of security deployment
   • Describe the process for deploying a security configuration.
   • Identify the security goals for each environment type

Unit 2 Work with project areas
   • Create a project area
   • Add users to a project area

Unit 3 Manage access to cases
   • Describe object security in a target object store
   • Create roles for a case
   • Create an in-basket for all assigned work
   • Assign users to case teams

Unit 4 Create a security configuration
   • Create a security configuration
   • Edit security configuration permissions
   • Apply a security configuration to a solution

Unit 5 Configure target object store security
   • Organize users and groups for target object store access

Unit 6 Configure deployed solution security
   • Package and export a solution
   • Import a solution to a new environment
   • Apply a solution configuration

Unit 7 Customize a privilege definition
   • Create a custom privilege definition
   • Apply a custom privilege definition to a security configuration

Unit 8 Use security proxies
   • Describe a security proxy scenario
   • Use a security proxy to modify permissions on a case
   • Describe how to transfer a solution with security proxies to a new environment

Unit A Automate case security changes
   • Describe a scenario for automating security changes
   • Use a FileNet workflow to change permissions on a case by using a security proxy

Unit B Additional security configurations
   • Analyze scenarios that require specific security customizations