Security and User Access Checklist
Table 2-13. Security and user access checklist provides a configuration consideration checklist to help define your security and user access requirements.
Table 2-13. Security and user access checklist
Complete
|
Security and User Access Check Item
|
Configuration Consideration
|
|
Created security groups for access to screens and functions
|
Security groups to be used to grant access to certain screens and functions have been created.
|
|
Created security groups for association with workflow steps
|
Security groups to allow users to act on a specific workflow step have been created.
|
|
Set security on package creation
|
All available options for restricting who can create and submit packages have been set.
|
|
Set security on package processing
|
All available options for restricting who can process packages have been set.
|
|
Set security on deployment system configuration
|
You have specified who can modify the deployment process. This includes editing the workflow, object type, environment, and security groups.
|
|
Security group and workflow considerations
|
|
|
Security group and object type considerations
|
Set ownership groups for object types. Members of the ownership group (determined by associating security groups) are the only users who can edit the object type.
|
|
Security group and environment considerations
|
Set ownership groups for environments. Members of the ownership group (determined by associating security groups) are the only users who can edit the environments.
|
|
Security group and notification template considerations
|
Set ownership groups for notification templates. Members of the ownership group (determined by associating security groups) are the only users who can edit the notification templates.
|
|
Security group and user data considerations
|
Set ownership groups for user data. Members of the ownership group (determined by associating security groups) are the only users who can edit user data.
|