Security Tasks |
This chapter provides instructions for the main security administration activities. This chapter includes scenario-specific recommendations for these reasons:
Different sites have different starting points. For example, migrated deployments include user definitions that were created in the original environment, whereas new deployments include only a few predefined users.
Different sites use different hosts. For example, a Windows site might choose to implement Integrated Windows authentication, whereas a UNIX site can't use that feature.
Different sites have different priorities. For example, one site might choose to initially grant broad access to data, whereas another site might need to provide that access selectively.
Note: Where possible, the instructions include sufficient detail to enable someone who is new to the material to perform standard tasks successfully. For specialized tasks, concepts, and background information, references to other chapters are provided.
The tasks are as follows:
See Also
Copyright © 2011 by SAS Institute Inc., Cary, NC, USA. All rights reserved.