Managing security information

 

This topic describes the tasks for managing security information.

Now that you have planned the security for your system, you need to ensure that your plan remains effective as your business needs change. This topic emphasizes simplicity as an essential goal in designing security. You have designed user groups as patterns for individual users. You have tried to use public authority, authorization lists, and library authority rather than specific individual authorities. Take advantage of that approach as you manage security:

 

Parent topic:

Managing security