Installation and Configuration → Security Administration → Setting up Security
Generally, you perform the following steps in order when setting up Deployment Automation security:
Create roles and define permissions for the various product areas. For most evaluations, the default roles should be adequate.
Use the UI security area to quickly assign access permissions to the different areas of the Deployment Automation Web application.
Use the system security area to assign usage permissions, including the ability to define security for other users.
See Role Configuration.
Authorization realms are used by authentication realms to associate users with groups and to determine user access. Deployment Automation includes an internal database for storing security information and provides an integration with the Lightweight Directory Access Protocol (LDAP). LDAP is a widely-used protocol for accessing distributed directory information over IP networks. If you are implementing a production version of Deployment Automation, the LDAP integration is recommended. If you are evaluating Deployment Automation, it is not necessary to set up the LDAP integration; full security is configured and enforced by the server.
Set default permissions by product area. You can set default permissions for all users or by group.
See Default Permissions.
The authentication realm is used to determine a user's identity within an authorization realm. Add users to appropriate authentication realms. If your are using LDAP, you can import users and map them to the security system.
If more than one realm has been configured, user authentication is determined following the hierarchy of realms defined on the Authentication pane. When a user attempts to log in, all realms are polled for matching credentials.
Add members to groups. Users who are members of groups inherit the groups' permissions.
To further refine the permissions by role, you can add groups and users to roles.
For most product areas, you set these in the Security tab for each specific product area and item. System Security and UI Security are set in the Administration > Security options of the same names.
For component security, no matter whether you set the security on the component level or application component level, the settings are applied everywhere.
Environment security settings are handled as follows:
Copyright © 2011–2015 Serena Software, Inc. All rights reserved.