System security overview
An organization has critical needs to control user access, and to protect sensitive information. First, an organization agrees on security requirements for business needs. Then, a system administrator configures the groups, views, access control items, and forms that IBM Security Identity Manager provides for security of its data.
See:
Parent topic: Technical overview