Course outline

IBM Case Foundation 5.2.1 – Security

Categories: Guaranteed To Run™, IBM

GK IBM LS Partner

Duration: 2 Hours

This course is designed to introduce workflow system security concepts, and to provide practice working with workflow system security. You work with an IBM Case Foundation 5.2.1 system to complete lesson exercises.

If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms

After completing this course, students should be able to:

  • Inspect workflow system security settings.
  • Identify and resolve workflow system security-related issues.
  • Configure security for a workflow system.

Before taking this course, students should have the following knowledge and skills:

  • Familiarity with Windows 2008 operating systems.
  • General knowledge of P8 Platform security concepts.
  • General workflow terminology:
    • Workflow
    • Workflow definitions
    • Queues
    • Rosters.
  • Start a P8 Platform system.
  • Familiarity with P8 Platform administration interfaces, including:
    • Administration Console for Content Platform Engine
    • IBM Content Navigator
    • Process Configuration Console
    • Process Designer

A Workflow System Administrator is responsible for day-to-day operations of a production IBM Case Foundation workflow application.

A Workflow System Administrator is typically required to help workflow participants to do the following tasks:

  • Locate work and complete workflows.
  • Respond to management decisions that require changes to work items.
  • Gather information about workflow activity to help management make business decisions.

A Workflow Author is responsible for planning, designing, developing, and testing a workflow application within a development environment.

Security overview

  • Inspect workflow system security settings.

Security configuration

  • Add users and groups to a workflow system.
  • Identify and resolve security issues.
This course is delivered by an authorized IBM Global Training Provider.
  • Guaranteed to Run™. This ensures you will attend the instructor led class or live online class you want as scheduled without any disruptive cancellations*. You book the training you need, get back to focusing on your job and are sure your training requirements will be met saving time, money and ensuring peace of mind.
  • This schedule icon the schedule indicates that this date/time will be conducted as Instructor Led Training (ILT) or a Virtual Instructor Led Training (VILT) depending on the indicated class availablity.
Privacy and Cookies

This website stores cookies on your computer which help us make the website work better for you.

Learn moreAccept and Close
Social media & sharing icons powered by UltimatelySocial