Step 3: Configuring access to Decision Center

To configure security access to Decision Center, you prepare your user registry and specify whether you delegate authorization to Decision Center.

Authentication
Whether a user has valid credentials to log in to Decision Center.
Authorization
Which features of Decision Center a user can access once logged in. This access is determined by the role of the user.

There are two possible approaches to configuring access to Decision Center:

When configuring security access to Decision Center, you create and manage users, groups, and roles to access both the Business and Enterprise consoles.