Administration → Security Administration → Setting up Security
Typically, you perform the following steps in order when setting up Deployment Automation your initial security. Thereafter, you will administer each security area as needed.
Create roles and define permissions for the various product areas. For most evaluations, the default roles should be adequate.
See Role Configuration.
Authorization realms are used by authentication realms to associate users with groups and to determine user access.
Set default permissions by product area. You can set default permissions for all users or by group.
See Default Permissions.
The authentication realm is used to determine a user's identity within an authorization realm. Add users to appropriate authentication realms. If more than one realm has been configured, user authentication is determined following the hierarchy of realms defined on the Authentication pane. When a user attempts to log in, all realms are polled for matching credentials.
Add members to groups. Users who are members of groups inherit the groups' permissions.
To further refine the permissions by role, you can give groups and users role membership as follows:
For component security, no matter whether you set the security on the component level or application component level, the settings are applied everywhere.
Environment security settings are handled as follows:
Copyright © 2011–2018 Serena Software, Inc., a Micro Focus company. All rights reserved.