ibm v4
7795  Reviews star_rate star_rate star_rate star_rate star_half

IBM Case Manager: Configure Security (v5.3.2)

This IBM Self-Paced Virtual Class (SPVC) includes: - PDF course guide available to attendee during and after course - Lab environment where students can work through demonstrations and exercises at...

Read More
$560 USD
Course Code F2929G-SPVC
Duration 1 day
Available Formats Self Paced

This IBM Self-Paced Virtual Class (SPVC) includes:
- PDF course guide available to attendee during and after course
- Lab environment where students can work through demonstrations and exercises at their own pace

Contains PDF course guide, as well as a lab environment where students can work through demonstrations and exercises at their own pace.

In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.

Skills Gained

  • Configure security in an IBM Case Manager development environment.
  • Create a security configuration package file.
  • Export a solution and a security configuration package file to a new environment.
  • Use a security configuration to apply security settings in a new environment.
  • Customize security settings.

Who Can Benefit

This course is for system administrators who maintain IBM Case Manager environments and for solution architects who must plan security requirements for their solutions.

Prerequisites

  • Knowledge of Case Manager concepts, such as case management, case, solution, task. 
  • Ability to build, validate, deploy, and test solutions, or
  • Build an IBM Case Manager Solution V5.3.2 (classroom)(F2910G) or 
  • Build an IBM Case Manager SolutionV5.3.2 (self-paced)(F2919G)

Course Details

Course Outline

  • Unit 1 Overview of security deployment
  • Unit 2 Work with project areas
  • Unit 3 Manage access to cases
  • Unit 4 Create a security configuration
  • Unit 5 Configure target object store security 
  • Unit 6 Configure deployed solution security
  • Unit 7 Customize a privilege definition
  • Unit 8 Use security proxies
  • Unit A Automate case security changes permissions on a case by using a security proxy
  • Unit B Additional security configurations