Security Verify Access administration
Administer Security Verify Access includes tasks such as installing and configuring resource managers, defining users and groups, and implementing security policies.
High-level tasks.
- Create domains and subdomains for management purposes, as necessary.
- Install and configure resource managers. During configuration, Security Verify Access resource managers and other components create a protected object space and protected resources, also known as protected objects.
- Create additional object spaces, as needed, for management purposes.
- Define protected objects in the object space to represent resources to be protected. Characteristics:
- Who is allowed access.
- What type of access is allowed.
- When that access is allowed.
- What other conditions that must be met before Security Verify Access allows access.
- Access request is audited.
- Manage protected objects.
- Define users and groups that require access to the protected resources.
- Implement your security policy by attaching the following elements to objects that are in the protected object space:
- An access control list (ACL)
- A protected object policy (POP)
- An authorization rule
See also:
- Domains
- Protected object space
- Users and groups
- Security policy
- ACL policies
- Protected object policies
- Authorization rules
- Guidelines for a secure object space
Parent topic: Verify Access Platform and Supporting Components administration