IOA security installation must be completed before proceeding with the security implementation of INCONTROL products.
It is recommended that the security administrator follow the implementation stages outlined below to verify that security of all INCONTROL products is successfully implemented:
Identify the types of users required for a test installation or production installation. Specify the types of security definitions required for each type of installation (for example, decide if Basic Definition mode is sufficient or if Extended Definition mode is required).
Create the definitions required to permit the INCONTROL products installer to perform all actions.
Follow the steps in ICE to specify the parameters required for the security implementation.
Follow the steps in ICE to submit all the security installation jobs. Check all error messages produced by each job.
Parent Topic |