Security Verify Access administration
Administering Security Verify Access includes tasks such as installing and configuring resource managers, defining users and groups, and implementing security policies.
The administration of Security Verify Access involves the following high-level tasks.
- Create domains and subdomains for management purposes, as necessary. See Domain management.
- Install and configure resource managers. During configuration, Security Verify Access resource managers and other components create a protected object space and protected resources, also known as protected objects.
- Create additional object spaces, as needed, for management purposes. See Object space management.
- Define protected objects in the object space, as needed, to represent
the resources that are to be protected. For protected objects, you
can define the following characteristics:
- Who is allowed access.
- What type of access is allowed.
- When that access is allowed.
- What other conditions that must be met before Security Verify Access allows access.
- Whether the access request is audited.
- Define users and groups that require access to the protected resources. See Manage users and groups.
- Implement your security policy by attaching the following
elements to objects that are in the protected object space:
- An access control list (ACL)
- A protected object policy (POP)
- An authorization rule