{"course":{"productid":19041,"modality":6,"active":true,"language":"fr","title":"Configure IBM Case Manager Security (V5.3.2)","productcode":"F2920G","vendorcode":"IB","vendorname":"IBM","fullproductcode":"IB-F2920G","courseware":{"has_ekit":true,"has_printkit":false,"language":"en"},"url":"https:\/\/portal.flane.ch\/course\/ibm-f2920g","essentials":"<p>&bull; Knowledge of Case Manager concepts, such as case management, case, solution, task.\n&bull; Ability to build, validate, deploy, and test solutions.\n&bull; or Build an IBM Case Manager Solution V5.3.2 (classroom)(F2910G)\n&bull; or Build an IBM Case Manager SolutionV5.3.2 (self-paced)(F2919G)<\/p>","audience":"<p>This course is for system administrators who maintain IBM Case Manager environments and for solution architects who must plan security requirements for their solutions.<\/p>","contents":"<p>In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.<\/p>","outline":"<p>Unit 1 Overview of security deployment&bull; Describe the process for deploying a security configuration.&bull; Identify the security goals for each environment typeUnit 2 Work with project areas&bull; Create a project area&bull; Add users to a project areaUnit 3 Manage access to cases&bull; Describe object security in a target object store&bull; Create roles for a case&bull; Create an in-basket for all assigned work&bull; Assign users to case teamsUnit 4 Create a security configuration&bull; Create a security configuration&bull; Edit security configuration permissions&bull; Apply a security configuration to a solutionUnit 5 Configure target object store security&bull; Organize users and groups for target object store accessUnit 6 Configure deployed solution security&bull; Package and export a solution&bull; Import a solution to a new environment&bull; Apply a solution configurationUnit 7 Customize a privilege definition&bull; Create a custom privilege definition&bull; Apply a custom privilege definition to a security configurationUnit 8 Use security proxies&bull; Describe a security proxy scenario&bull; Use a security proxy to modify permissions on a case&bull; Describe how to transfer a solution with security proxies to a new environmentUnit A Automate case security changes&bull; Describe a scenario for automating security changes&bull; Use a FileNet workflow to change permissions on a case by using a security proxyUnit B Additional security configurations&bull; Analyze scenarios that require specific security customizations<\/p>","essentials_plain":"\u2022 Knowledge of Case Manager concepts, such as case management, case, solution, task.\n\u2022 Ability to build, validate, deploy, and test solutions.\n\u2022 or Build an IBM Case Manager Solution V5.3.2 (classroom)(F2910G)\n\u2022 or Build an IBM Case Manager SolutionV5.3.2 (self-paced)(F2919G)","audience_plain":"This course is for system administrators who maintain IBM Case Manager environments and for solution architects who must plan security requirements for their solutions.","contents_plain":"In this course you will configure security for IBM Case Manager environments and solutions. You will work with project areas, control access to cases, and create security configurations. You will deploy a solution in a new environment and use a security configuration package file to manage solution security. You will customize security settings with a custom privilege definition and use security proxies to automate security changes.","outline_plain":"Unit 1 Overview of security deployment\u2022 Describe the process for deploying a security configuration.\u2022 Identify the security goals for each environment typeUnit 2 Work with project areas\u2022 Create a project area\u2022 Add users to a project areaUnit 3 Manage access to cases\u2022 Describe object security in a target object store\u2022 Create roles for a case\u2022 Create an in-basket for all assigned work\u2022 Assign users to case teamsUnit 4 Create a security configuration\u2022 Create a security configuration\u2022 Edit security configuration permissions\u2022 Apply a security configuration to a solutionUnit 5 Configure target object store security\u2022 Organize users and groups for target object store accessUnit 6 Configure deployed solution security\u2022 Package and export a solution\u2022 Import a solution to a new environment\u2022 Apply a solution configurationUnit 7 Customize a privilege definition\u2022 Create a custom privilege definition\u2022 Apply a custom privilege definition to a security configurationUnit 8 Use security proxies\u2022 Describe a security proxy scenario\u2022 Use a security proxy to modify permissions on a case\u2022 Describe how to transfer a solution with security proxies to a new environmentUnit A Automate case security changes\u2022 Describe a scenario for automating security changes\u2022 Use a FileNet workflow to change permissions on a case by using a security proxyUnit B Additional security configurations\u2022 Analyze scenarios that require specific security customizations","version":"1","duration":{"unit":"d","value":1,"formatted":"1 jour"},"pricelist":{"List Price":{"CH":{"country":"CH","currency":"CHF","taxrate":8.1,"price":990}}},"lastchanged":"2026-03-12T14:55:25+01:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course-schedule\/19041","source_lang":"fr","source":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course\/ibm-f2920g"}}