Configure IBM Case Manager Security (V5.3.2)
- Référence F2920G
- Durée d’accès 30 jour(s)
Modalité pédagogique
Modalité pédagogique
La formation est disponible dans les formats suivants:
-
Classe inter à distance
Depuis n'importe quelle salle équipée d'une connexion internet, rejoignez la classe de formation délivrée en inter-entreprises.
-
E-Learning
Pour cette formation, il existe aussi un produit d’auto-formation en ligne. Nous consulter.
-
Classe inter en présentiel
Formation délivrée en inter-entreprises. Cette méthode d'apprentissage permet l'interactivité entre le formateur et les participants en classe.
-
Intra-entreprise
Cette formation est délivrable en groupe privé, et adaptable selon les besoins de l’entreprise. Nous consulter.
Demander cette formation dans un format différent
Résumé
Haut de pageIn this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.
Public
Haut de pageThis course is for system administrators who maintain IBM Case Manager environments and for solution architects who must plan security requirements for their solutions.
Objectifs de la formation
Haut de page- Configure security in an IBM Case Manager development environment.
- Create a security configuration package file.
- Export a solution and a security configuration package file to a new environment.
- Use a security configuration to apply security settings in a new environment.
- Customize security settings.
Programme détaillé
Haut de pageUnit 1 Overview of security deployment
• Describe the process for deploying a security configuration.
• Identify the security goals for each environment type Unit 2 Work with project areas
• Create a project area
• Add users to a project area Unit 3 Manage access to cases
• Describe object security in a target object store
• Create roles for a case
• Create an in-basket for all assigned work
• Assign users to case teams Unit 4 Create a security configuration
• Create a security configuration
• Edit security configuration permissions
• Apply a security configuration to a solution Unit 5 Configure target object store security
• Organize users and groups for target object store access Unit 6 Configure deployed solution security
• Package and export a solution
• Import a solution to a new environment
• Apply a solution configuration Unit 7 Customize a privilege definition
• Create a custom privilege definition
• Apply a custom privilege definition to a security configuration Unit 8 Use security proxies
• Describe a security proxy scenario
• Use a security proxy to modify permissions on a case
• Describe how to transfer a solution with security proxies to a new environment Unit A Automate case security changes
• Describe a scenario for automating security changes
• Use a FileNet workflow to change permissions on a case by using a security proxy Unit B Additional security configurations
• Analyze scenarios that require specific security customizations
Pré-requis
Haut de page• Knowledge of Case Manager concepts, such as case management, case, solution, task.
• Ability to build, validate, deploy, and test solutions.
• or Build an IBM Case Manager Solution V5.3.2 (classroom)(F2910G)
• or Build an IBM Case Manager SolutionV5.3.2 (self-paced)(F2919G)
- /fr-fr/-/media/global-knowledge/merchandising/right-side-column/fr/reviews/review-ibm.png #000000
- <p><br /></p><table style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;" border="3" cellspacing="2" cellpadding="5" data-mce-style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;"><tbody><tr><td style="width: 100%;" data-mce-style="width: 100%;"><p style="text-align: left;" data-mce-style="text-align: left;"><strong><span style="color: #141c36;" data-mce-style="color: #141c36;">Modalité d'évaluation</span></strong></p><hr /><p style="text-align: left;" data-mce-style="text-align: left;">A l'issue de la formation, le participant est invité à s’auto-évaluer par rapport aux objectifs énoncés.</p></td></tr></tbody></table>
- <table style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;" border="3" cellspacing="2" cellpadding="5" data-mce-style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;"><tbody><tr><td style="width: 100%;" data-mce-style="width: 100%;"><p style="text-align: left;" data-mce-style="text-align: left;"><strong><span style="color: #141c36;" data-mce-style="color: #141c36;">Délais d’inscription</span></strong></p><hr /><p style="text-align: left;" data-mce-style="text-align: left;">Avant le début de la formation <strong>jusqu’à 5 jours ouvrés sous réserve de disponibilité </strong>sauf dans le cas d'un financement <a title="compte CPF" href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf" data-mce-href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf">CPF,</a> jusqu'à 11 jours ouvrés. <a rel="noopener noreferrer" title="formations éligibles CPF" href="mailto:cpf@globalknowledge.fr" target="_blank" rel="noopener noreferrer" data-mce-href="mailto:cpf@globalknowledge.fr">Contactez-nous</a> pour connaître les formations éligibles.</p></td></tr></tbody></table><p><br /></p>
- #000000
- #000000
- F2920G
- Configure IBM Case Manager Security (V5.3.2)
- Analyse decisionnelle
- F2920G | Configure IBM Case Manager Security (V5.3.2) | Training Course | IBM.
- IBM