Security planning
After installing IBM Security Identity Manager, we plan how to manage user access to resources.
- Initial security conditions after installation
- Group management issues
- Access control item management issues
Parent topic: Planning