Defining users   

Chapter 3: Setting Up Role-Based Authorization

Enabling security for clusters

Use the instructions in the e-Biz Impact Configurator Guide, Chapter 2, “Configuring Clusters” to enable authorization for yours clusters. To use e-Biz Impact’s authorization capabilities, you must select the Security option on the Cluster Properties Advanced tab in the Configurator. If the Security option is not selected, a cluster ignores the security settings specified in the Authorization Console.





Copyright © 2005. Sybase Inc. All rights reserved.  

View this book as PDF