Presented by [Harshit Agrawal] 03/02/2017

Slides:



Advertisements
Similar presentations
Configuring Security in RiteTrack3 Webinar, March 28 th, 2008 Jim Drever, Marketing Director Justin Olson, Deployment Manager.
Advertisements

1 Disable Pictures & Login. 2 Turn off Pop-up Blocker.
Eric J. Oszakiewski MCTS: SharePoint Application Development SharePoint Configuration.
Setting up an E-XL A Step by Step Tutorial Engineering Consultants Group, Inc.
Informer Security PRESENTER: Tim Nicholson | | March 5-6, 2012.
Tutorial EBSCOadmin User Groups support.ebsco.com.
Presentation Heading – font Arial
Michael Donovan, River Campus Libraries – 12/03 DocuShare Overview and Training.
This presentation contains the following: -the availability and need menu options -the add option Mark Smith.
Building a Deployment The following screens demonstrate how to: 1. Create a new OpenHRE™ tailor-made deployment using a remote (sample) deployment Standard.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Administrator Training. Login Screen Filled Forms Screen Logging In.
This is Signum DSC, a web application that is both a form management tool and digital signature capture device. Like all web applications, a secure login.
Business Data Catalog. Planning the Business Data Catalog Configuring the Business Data Catalog In This Session …
WaveMaker Visual AJAX Studio 4.0 Training Authentication.
Creating a Web Site to Gather Data and Conduct Research.
South Dakota Library Network MetaLib Management Basics Customizing QuickSets South Dakota Library Network 1200 University, Unit 9672 Spearfish, SD
RMsis – v Simplify Requirement Management for JIRA.
TxEIS Security A role-based solution October 2010.
Moodle and ACME. How do they compare? Groups Notes Discussions Tests Grades Web pages TurnItIn Database Glossary Questionare Wiki Calandar Quick mail.
Chapter 8 Collecting Data with Forms. Chapter 8 Lessons Introduction 1.Plan and create a form 2.Edit and format a form 3.Work with form objects 4.Test.
QAD.NET UI – Configured Screens Stacy Elwood Green, BravePoint MWUG September 2011.
Content Management System Overview. URL: Home Page.
Working with GridView Control: Adding Columns. Adding Buttons to a Bound GridView: 1. Drag the WebProduct table from Data connection to a page 2. Demo.
Damian Tamayo Tutorial DTM Data Generator Fall 2008 CIS 764.
1 Part-1 Chap 5 Configuring Accounts Definitions.
Advanced samples Printing two types of labels from two different custom forms We have two different labels that contain the same data. One is suitable.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
Microsoft FrontPage 2003 Illustrated Complete Integrating a Database with a Web Site.
Module 5 : Security I Jong S. Bok
03 | Manage Team Foundation Server Steven Borg | Co-founder & Strategist, Northwest Cadence Anthony Borton | ALM Consultant, Enhance ALM.
How to use Poken Partner Hub. Agenda INTRODUCTION Login Main Page FUNCTIONS Edit: Profile Page Lead Survey Manage: Visitors Objects Permissions REPORTS.
Information Management System “Institutions Module" Information Management System “Institutions Module" The System management module is an integrated part.
How to Use Your Committee Workspace. Click Here AFPMB Homepage.
Administration Console User Management Truman Shuck October 1 st, 2012.
29 Copyright © 2009, Oracle. All rights reserved. Administering the Oracle Business Intelligence Presentation Catalog.
WaveMaker Visual AJAX Studio 4.0 Training Role Based Access Control.
© CGI Group Inc. User Guide PrimePortal – User Administration.
Web EOC Training. Objectives  Provide an overview of WebEOC -- concept and usage.  Getting started—Internet locations.  Who has access.  Review how.
SOP of Transferring PecStar Database October 2013.
Presented by [Harshit Agrawal] 04/03/2017
Grouping EBSCOhost Databases by Subject in EBSCOadmin
Data Virtualization Demoette… Business Directory Custom Properties
Create and Assign Entity Roles
Restraint Data Web Application User Guide
Adding direct links to online archives from your VLE
Jkelany Chat Project.
Update AMHOME Password
LMEvents SharePoint Portal How-to Guide
OCC/RAPS Feature Commonwealth of Pennsylvania Department of Revenue
Quickr Places & Templates Introduction
Access Control in Windows
Setting the Permissions
(Includes setup) FAQ ON DOCUMENTS (Includes setup)
Instructions for Windows users:
Instructions for Windows users:
Instructions for Windows users:
Indistar : Agenda & Minutes Upgrade
How to Create a Microsoft Access 2007 Database
User Guide PrimePortal – User Administration
PIE Planning & Resources
Overview of the English Language Proficiency Assessment Irregularities Web Application System (ELPAIWAS) Virginia Department of Education Division of Student.
Forms, Resource Links, Discounts & Locations
Using Employee Development in ADP Workforce Now
You will need to click the login button here
February 11-13, 2019 Raleigh, NC.
SOP of System Security Settings
PCW-09 Vision: Information Center Approval System
Builder/Rater Training Guide to Create a Project and Submit
(Includes setup) FAQ ON DOCUMENTS (Includes setup)
Presentation transcript:

Presented by [Harshit Agrawal] 03/02/2017 Security Group Presented by [Harshit Agrawal] 03/02/2017

Agenda: What is Security Group Creating a Security Group.

What is Security Group A security group is a collection of permissions that determine what data users can access from a source database when you run a database archive project. You define security groups for source connections. The permissions in the security group determine the entities that a user can select when adding entities to archive and retirement projects. When you create or edit security groups, you configure properties for general information, permissions, and users.

Creating a Security Group Login to the ILM Web UI and perform the following: 1.Click Administration > Manage Security Groups. 2.Click New Security Group.(The Create or Edit a Security Group page appears.) 3.Enter the general information properties. Security Group Name: Name of the Security Group Connection: Source connection that you want to configure the security group for. Description: Description of the security group Enabled: Activates the security group. Clear the field to disable the security group.

Continued.. 4.Click Add Permission (A window appears with a list of defined permissions.) 5.Select the permission and click Select. (The permission appears in the list of permissions.) 6.Enter the permissions properties. 7.Click Add User (A window appears with a list of users.) 8.Select a user and click Select. (The user appears in the list of users.) 9.Enter the user properties. 10.Click Save.

DEMO

Any kind of feedback we would like to hear from you: supportvideos@informatica.com https://twitter.com/INFAsupport

Thank You