How Security is Set Up

Setting up security-controlled access to the system involves the following tasks. Understanding these tasks helps you set up a powerful and efficient security system.
cla140
Setting up security-controlled access to the system involves the following tasks. Understanding these tasks helps you set up a powerful and efficient security system.
  • Add security profiles to the system. By default, predefined profiles are added to the security system and cannot be removed.
  • Specify class permissions for the object classes that are listed in the Class Permissions dialog.
    Make sure that you restrict profiles from changing access rights to security profiles, security areas and class permissions object classes. Open the profiles and set their class permission access type to No Access for these three object classes.
However, to fine tune the security system further, you can do the following:
  • Set the group access or object access for each folder, or object visible in the Explorer.
  • Use Special Access to select any combination of access permissions: view, read, write, delete, execute, change permissions and take ownership.
Any operating system user with a valid account on the domain manager can connect to the system, that is, a user need not be an Administrator anymore. Access to system features and functions is controlled by its internal security mechanisms. By default, Administrators and the owner get full access, everyone else gets No Access. However, you can change access rights by updating the permissions after installation.
If you are connected to the Enterprise Manager, ensure that you have an account with sufficient user rights (or user group rights) for accessing the security functions on each downstream Domain Manager. If you are connected to a Domain Manager, ensure that you have an account with sufficient rights for accessing the security functions on the Enterprise Manager.