How To
Summary
How to tailor the security of the IBM Content Navigator or the Business Automation Navigator configuration database in a containerized deployment.
Document Location
Worldwide
[{"Type":"MASTER","Line of Business":{"code":"LOB18","label":"Miscellaneous LOB"},"Business Unit":{"code":"BU056","label":"Miscellaneous"},"Product":{"code":"SSEUEX","label":"IBM Content Navigator"},"ARM Category":[{"code":"a8m0z0000001jf7AAA","label":"ICN-\u003EPlanning"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"3.0.14;and future releases"},{"Type":"MASTER","Line of Business":{"code":"LOB76","label":"Data Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSBYVB","label":"IBM Cloud Pak for Business Automation"},"ARM Category":[{"code":"a8m0z0000001iTlAAI","label":"Operate-\u003EBAN Install\\Upgrade\\Setup"}],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"23.0.1;and future releases"}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Was this topic helpful?
Document Information
Modified date:
13 July 2023
UID
ibm17010063