Course outline

IBM Emptoris Contract Management-Security Model (V10.0.1)

Categories: Guaranteed To Run™, IBM

GK IBM LS Partner

Duration: 1.5 Hours

This course covers the important topic of Security. In it, we discuss in detail the two pillars of Contract Management functionality that were deployed together to craft a viable, effective Security system for our training platform.

If the Learning Objectives included in this course description imply the presence of teaching content that interests you, open the course and use the Table of Contents to go directly to the content you require.

If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

http://www.ibm.com/training/terms

Security Overview 

  • What is the Relevance to you of the Training Platform Security Model

 

User Groups and Permission Groups 

After completing this lesson, you should be able to:

  • Describe the role of a User Group.
  • Describe the role of Permissions and Permission Groups.

Pillar One: Job Roles, User Groups and Permission Groups

After completing this lesson, you should be able to:

  • Describe the role of Job Roles in our Security System
  • Describe the role of User Groups and Permission Groups vis-a-vis Job Role.

Pillar Two: Organization as a Security Vehicle

After completing this lesson, you should be able to:

  • Demonstrate an understanding of the Organizational structure of the version of Contract Management that is used in class.
  • Describe the role and importance of a contract’s Owning Organization.
  • Describe the role and importance of the relative position of a User Id in a Contract Management system’s overall Organization structure.
  • Describe the relationship between Owning Organization and User ID Organizational placement in determining contract visibility.

This course is designed for Contract Creators.

  • Security Overview 
  • User Groups and Permission Groups 
  • Pillar One: Job Roles, User Groups and Permission Groups
  • Pillar Two: Organization as a Security Vehicle
This course is delivered by an authorized IBM Global Training Provider.

Feel free to contact us, if you want to know the price and location of this course. A Digital Revolver representative will contact you shortly to help you with your inquiry.
Please fill out the form below

  • Guaranteed to Run™. This ensures you will attend the instructor led class or live online class you want as scheduled without any disruptive cancellations*. You book the training you need, get back to focusing on your job and are sure your training requirements will be met saving time, money and ensuring peace of mind.
  • This schedule icon the schedule indicates that this date/time will be conducted as Instructor Led Training (ILT) or a Virtual Instructor Led Training (VILT) depending on the indicated class availablity.
Privacy and Cookies

This website stores cookies on your computer which help us make the website work better for you.

Learn moreAccept and Close
Social media & sharing icons powered by UltimatelySocial