Configuring Common Security
Configuring security is one of the crucial steps after installation, as it provides the gateway to the
CA Client Automation
system. You can decide the security model that suits your organization and set up the security system accordingly. Decision on the security model can be made based on the following factors:cla140
Configuring security is one of the crucial steps after installation, as it provides the gateway to the
CA Client Automation
system. You can decide the security model that suits your organization and set up the security system accordingly. Decision on the security model can be made based on the following factors:- Individual users and groups (both local and domain) who need access to the system.
- The type of access, say, read, write, execute and so on, required by each user and group.
- The level of permission required, say, class, group, object or area level permissions.
If a user has two profiles, one mapped to his user account and the other mapped to a group, then the resulting permissions is the union of permissions in both the profiles. This rule is also valid, if a user is member of several groups which are defined as security profiles.
By default, the members of the administrators group are granted full access control. So, once the installation of
CA Client Automation
is complete, any member of the administrators group can log in to the DSM domain and create further users and grant access rights.