Security Verify Access administration

Administer Security Verify Access includes tasks such as installing and configuring resource managers, defining users and groups, and implementing security policies.

High-level tasks.

  1. Create domains and subdomains for management purposes, as necessary.

  2. Install and configure resource managers. During configuration, Security Verify Access resource managers and other components create a protected object space and protected resources, also known as protected objects.

  3. Create additional object spaces, as needed, for management purposes.

  4. Define protected objects in the object space to represent resources to be protected. Characteristics:

    • Who is allowed access.
    • What type of access is allowed.
    • When that access is allowed.
    • What other conditions that must be met before Security Verify Access allows access.
    • Access request is audited.

  5. Manage protected objects.

  6. Define users and groups that require access to the protected resources.

  7. Implement your security policy by attaching the following elements to objects that are in the protected object space:

See also:

Parent topic: Verify Access Platform and Supporting Components administration