Steps to Implement the OOTB Security Design

CSM is shipped with an OOTB security design complete with OOTB Security Groups, OOTB Roles, OOTB Teams/Workgroups, and OOTB security settings. Complete the following steps to implement the OOTB security design.

To implement the OOTB security design:

  1. Review the OOTB security design: Understand the OOTB Security Groups, Roles, and Teams/Workgroups.
  2. Complete the User/Customer Worksheet to determine which Security Group and Teams/Workgroups to assign each User/Customer to.
  3. Add your people:
    1. Create User Profiles: Create a User Profile for each CSM User (CSM Administrator>Security>Edit Users). During this process, you will assign each person to one Security Group, and one or more Teams.
    2. Create Customer Profiles (Customer Records): Create a Customer Record for each Customer you support (from the CSM Desktop Client toolbar, click the New button and select Customer-Internal).

      Unlike a User Profile, a Customer Record does not store account credentials or Workgroup information.

      To save time, you can import users already stored in a Directory Service (ex: Active Directory). Refer to import Users/Customers.

  4. Explore Security design ideas.
  5. (Optional) Configure Security: CSM provides numerous system security settings (ex: Login, authentication, inactivity, password enforcement, etc.); you can change these, if needed, but it is not required.