Step 3: Configuring access to Decision Center
To configure security access to Decision Center, you prepare your user registry and specify whether you delegate authorization to Decision Center.
- Authentication
- Whether a user has valid credentials to log in to Decision Center.
- Authorization
- Which features of Decision Center a user can access once logged in. This access is determined by the role of the user.
There are two possible approaches to configuring access to Decision Center:
- The recommended approach is to delegate authorization to Decision Center. This allows for easier management of users, groups, and roles from Decision Center.
- You may use the application server for authorization. In this case, authentication and authorization are both based on the J2EE container.
When configuring security access to Decision Center, you create and manage users, groups, and roles to access both the Business and Enterprise consoles.