About CMDB Security
This chapter includes the following topics:
■
About CMDB security
■
About role-based security
■
About predefined security roles
■
About role-based security configuration
■
About scope-based security
■
About security scoping for reports
About CMDB security
In most environments, you have multiple users that need to have various degrees
of access to CMDB Solution. Each type of user has different access needs. Setting
up security properly ensures that your data is secure while permitting users to
have the access they need. Example: A user might be a manager, who needs to
have access to reports in the department the user manages. Another user, the
administrator, requires permissions over everything.
CMDB Solution supports the following methods of security:
■
Role-based security
See
“About role-based security”
on page 40.
■
Scope-based security
See
“About scope-based security”
on page 41.
7
Chapter
Содержание Altiris CMDB Solution 7.0
Страница 1: ...Altiris CMDB Solution from Symantec Users Guide Version 7 0 ...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com ...
Страница 10: ...Contents 10 ...
Страница 28: ...Using resource types About the resource data class summary page 28 ...
Страница 34: ...Using resources About reports on owned resources 34 ...
Страница 62: ...Using the CMDB interface Update Organizational Hierarchy task page 62 ...