<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="19041" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/ibm-f2920g" lastchanged="2026-03-12T14:55:25+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Configure IBM Case Manager Security (V5.3.2)</title><productcode>F2920G</productcode><vendorcode>IB</vendorcode><vendorname>IBM</vendorname><fullproductcode>IB-F2920G</fullproductcode><version>1</version><essentials>&lt;p&gt;&amp;bull; Knowledge of Case Manager concepts, such as case management, case, solution, task.
&amp;bull; Ability to build, validate, deploy, and test solutions.
&amp;bull; or Build an IBM Case Manager Solution V5.3.2 (classroom)(F2910G)
&amp;bull; or Build an IBM Case Manager SolutionV5.3.2 (self-paced)(F2919G)&lt;/p&gt;</essentials><audience>&lt;p&gt;This course is for system administrators who maintain IBM Case Manager environments and for solution architects who must plan security requirements for their solutions.&lt;/p&gt;</audience><contents>&lt;p&gt;In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.&lt;/p&gt;</contents><outline>&lt;p&gt;Unit 1 Overview of security deployment&amp;bull; Describe the process for deploying a security configuration.&amp;bull; Identify the security goals for each environment typeUnit 2 Work with project areas&amp;bull; Create a project area&amp;bull; Add users to a project areaUnit 3 Manage access to cases&amp;bull; Describe object security in a target object store&amp;bull; Create roles for a case&amp;bull; Create an in-basket for all assigned work&amp;bull; Assign users to case teamsUnit 4 Create a security configuration&amp;bull; Create a security configuration&amp;bull; Edit security configuration permissions&amp;bull; Apply a security configuration to a solutionUnit 5 Configure target object store security&amp;bull; Organize users and groups for target object store accessUnit 6 Configure deployed solution security&amp;bull; Package and export a solution&amp;bull; Import a solution to a new environment&amp;bull; Apply a solution configurationUnit 7 Customize a privilege definition&amp;bull; Create a custom privilege definition&amp;bull; Apply a custom privilege definition to a security configurationUnit 8 Use security proxies&amp;bull; Describe a security proxy scenario&amp;bull; Use a security proxy to modify permissions on a case&amp;bull; Describe how to transfer a solution with security proxies to a new environmentUnit A Automate case security changes&amp;bull; Describe a scenario for automating security changes&amp;bull; Use a FileNet workflow to change permissions on a case by using a security proxyUnit B Additional security configurations&amp;bull; Analyze scenarios that require specific security customizations&lt;/p&gt;</outline><essentials_plain>• Knowledge of Case Manager concepts, such as case management, case, solution, task.
• Ability to build, validate, deploy, and test solutions.
• or Build an IBM Case Manager Solution V5.3.2 (classroom)(F2910G)
• or Build an IBM Case Manager SolutionV5.3.2 (self-paced)(F2919G)</essentials_plain><audience_plain>This course is for system administrators who maintain IBM Case Manager environments and for solution architects who must plan security requirements for their solutions.</audience_plain><contents_plain>In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.</contents_plain><outline_plain>Unit 1 Overview of security deployment• Describe the process for deploying a security configuration.• Identify the security goals for each environment typeUnit 2 Work with project areas• Create a project area• Add users to a project areaUnit 3 Manage access to cases• Describe object security in a target object store• Create roles for a case• Create an in-basket for all assigned work• Assign users to case teamsUnit 4 Create a security configuration• Create a security configuration• Edit security configuration permissions• Apply a security configuration to a solutionUnit 5 Configure target object store security• Organize users and groups for target object store accessUnit 6 Configure deployed solution security• Package and export a solution• Import a solution to a new environment• Apply a solution configurationUnit 7 Customize a privilege definition• Create a custom privilege definition• Apply a custom privilege definition to a security configurationUnit 8 Use security proxies• Describe a security proxy scenario• Use a security proxy to modify permissions on a case• Describe how to transfer a solution with security proxies to a new environmentUnit A Automate case security changes• Describe a scenario for automating security changes• Use a FileNet workflow to change permissions on a case by using a security proxyUnit B Additional security configurations• Analyze scenarios that require specific security customizations</outline_plain><duration unit="d" days="1">1 day</duration><pricelist><price country="CH" currency="CHF">990.00</price></pricelist><miles/></course>