Security and User Access Checklist

Table 2-13. Security and user access checklist provides a configuration consideration checklist to help define your security and user access requirements.

Table 2-13. Security and user access checklist

Complete

Security and User Access Check Item

Configuration Consideration

 

Created security groups for access to screens and functions

Security groups to be used to grant access to certain screens and functions have been created.

 

Created security groups for association with workflow steps

Security groups to allow users to act on a specific workflow step have been created.

 

Set security on package creation

All available options for restricting who can create and submit packages have been set.

 

Set security on package processing

All available options for restricting who can process packages have been set.

 

Set security on deployment system configuration

You have specified who can modify the deployment process. This includes editing the workflow, object type, environment, and security groups.

 

Security group and workflow considerations

  • Associate security groups with workflow steps. Users in the included groups can act on the step.

  • Set workflow and workflow step ownership.

 

Security group and object type considerations

Set ownership groups for object types. Members of the ownership group (determined by associating security groups) are the only users who can edit the object type.

 

Security group and environment considerations

Set ownership groups for environments. Members of the ownership group (determined by associating security groups) are the only users who can edit the environments.

 

Security group and notification template considerations

Set ownership groups for notification templates. Members of the ownership group (determined by associating security groups) are the only users who can edit the notification templates.

 

Security group and user data considerations

Set ownership groups for user data. Members of the ownership group (determined by associating security groups) are the only users who can edit user data.