Managing security information
This topic describes the tasks for managing security information.
Now that you have planned the security for your system, you need to ensure that your plan remains effective as your business needs change. This topic emphasizes simplicity as an essential goal in designing security. You have designed user groups as patterns for individual users. You have tried to use public authority, authorization lists, and library authority rather than specific individual authorities. Take advantage of that approach as you manage security:
- When you add a new user group or a new application, use the techniques that you used to plan security.
- When you need to make changes to security, try to take a general approach rather than creating an exception to solve a specific problem.
- Working with security commands
This topic describes how use security commands to display, change, and delete security information.
- Adding a new user to the system
This information explains how to add new users to the system.
- Adding a new application
This topic describes how to add a new application, and provides step-by-step instructions.
- Adding a new workstation
This topic describes how to add a new workstation, and provides step-by-step instructions.
- Changing a user group
This topic describes how to change a user group, explains why it is important, and provides step-by-step instructions.
- Changing a user profile
This topic describes how to change a user profile, and provides step-by-step instructions.
- Enabling a disabled user profile
This topic describes how to enable a disabled user profile, explains why it is important, and provides step-by-step instructions.
- Renaming a user profile
This topic describes how to rename a user profile, explains why it is important, and provides step-by-step instructions.
- Scheduling availability of user profiles
You may want some user profiles to be available for sign-on only at certain times of the day or certain days of the week.
- Removing a user from the system
This topic describes how to remove a user from the system, explains why it is important, and provides step-by-step instructions.
Parent topic:
Managing security