About CMDB Security
This chapter includes the following topics:
About CMDB security
In most environments, you have multiple users that need to have various degrees
of access to CMDB Solution. Each type of user has different access needs. Setting
up security properly ensures that your data is secure while permitting users to
have the access they need. Example: A user might be a manager, who needs to
have access to reports in the department the user manages. Another user, the
administrator, requires permissions over everything.
CMDB Solution supports the following methods of security:
About CMDB security
About role-based security
About predefined security roles
About role-based security configuration
About scope-based security
About security scoping for reports
Role-based security
See
About role-based security"
Scope-based security
See
About scope-based security"
Chapter
on page 40.
on page 41.
7
Need help?
Do you have a question about the ALTIRIS CMDB SOLUTION 7.0 - V1.0 and is the answer not in the manual?
Questions and answers