Security planning

After installing IBM Security Identity Manager, we plan how to manage user access to resources.

  1. Initial security conditions after installation
  2. Group management issues
  3. Access control item management issues

Parent topic: Planning