Course outline

IBM FileNet Content Manager 5.2.1 – Security

Categories: Guaranteed To Run™, IBM

GK IBM LS Partner

Duration: 5 Hours

Learn to administer security on an IBM FileNet Content Manager 5.2.1 system. This comprehensive security course covers directly modifying security, to configuring security on an object store and its objects.

If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms

  • Resolve logon failures
  • Verify object store access
  • Change security on a document
  • Change the owner of a document
  • Customize document access
  • Configure object store security
  • Configure class and property security
  • Configure security inheritance
  • Basic computer skills: Able to use computers, authenticate using a name and password, follow hyperlinks, and use common user interface elements such as buttons, menus, and tabs.
  • Able to use IBM Content Navigator for typical content management tasks, including navigating object stores, downloading and uploading documents, checking in and checking out.
  • Able to administer IBM Content Navigator, including configuring desktops.
  • Recommended prerequisite courses:
    • IBM Content Navigator 2.0.3.6: Administration (F271G)
    • IBM FileNet Content Manager 5.2.1: Introduction (F280G)
    • IBM FileNet Content Manager 5.2.1: Build a FileNet Content Repository (F281G)
    • IBM FileNet Content Manager 5.2.1: Work with object metadata (F282G)
  • System Administrators who are responsible for:
    • Maintaining the IBM FileNet Content Manager domains.
    • Administering development and production environments.
  • Resolve access issues
    • Security in the IBM FileNet P8 domain
    • Authentication
    • Authorization
    • Security principals
    • Users and groups
    • Security realms
    • IBM Content Navigator Desktop
    • Login Errors
  • Modify direct security
    • Permissions
    • Security sources
    • Security sources and order of evaluation
    • What is direct security?
    • Access control from IBM Content Navigator
    • Access control in Administration Console
    • Permission groups
    • Ownership
  • Configure object store security
    • Required accounts
    • Configure object store administrators and users
    • Example security scenario
    • Overview of initial security configuration
    • Super groups
    • Security Script Wizard
    • Root folder security
  • Configure class and property security
    • Default instance security
    • Setting default instance security
      Property modification security
    • Configure property modification access
    • System property modification
  • Configure security inheritance
    • Overview of security inheritance
    • Definition of terms
    • Security inheritance architecture
    • Characteristics of inherited permissions
    • Methods for configuring security inheritance
    • Use a security folder
    • Use an object as a security proxy
    • Guidelines
This course is delivered by an authorized IBM Global Training Provider.
  • Guaranteed to Run™. This ensures you will attend the instructor led class or live online class you want as scheduled without any disruptive cancellations*. You book the training you need, get back to focusing on your job and are sure your training requirements will be met saving time, money and ensuring peace of mind.
  • This schedule icon the schedule indicates that this date/time will be conducted as Instructor Led Training (ILT) or a Virtual Instructor Led Training (VILT) depending on the indicated class availablity.
Privacy and Cookies

This website stores cookies on your computer which help us make the website work better for you.

Learn moreAccept and Close
Social media & sharing icons powered by UltimatelySocial