Planning the security system

Enterprise Security provides a comprehensive package of security services that encompasses all aspects of security, including authentication, authorization, and encryption. The type of security that you design is based on your system.

User populations for e-business systems can be very large, creating an environment in which traditional user account management and access control cannot function well.

Before setting up the Enterprise Security system, the PSO should carefully review the structure of the business enterprise, the assets that must be secured, the types of security required for each asset, the information needs of users, whether encryption and digital signatures are to be included, available hardware and software, failover requirements, and other issues that affect security and the secured system.

NoteThe system administrator has special access rights to install and configure Enterprise Security. The PSO should reset the administrator’s security access after installation and configuration are complete.

The following procedure summarizes the steps that are necessary to set up security and populate the ACDB. Chapter 3, “Setting Up Security,” provides details on each step.

StepsSetting up your security system

  1. Create the organizational hierarchy for the security system. The root level organization is defined when you install and configure Enterprise Security. You can create suborganizations to mirror the organizational structure of your enterprise. Enterprise Security does not limit the number of suborganizations or the number of organizational levels. However, there can be only one root organization.

    The Enterprise Security installation also creates a default domain—which contains the root organization—and an associated security policy. If you create a suborganization, you can choose whether to create it in the default domain or in a new domain.

  2. Create users.

  3. Create groups and populate them with users.

  4. Create roles for users and groups.

  5. Create assets.

  6. Define permissions so users can access the assets.