Steps to Implement the OOTB Security Design
CSM is shipped with an OOTB security design complete with OOTB Security Groups, OOTB Roles, OOTB Teams/Workgroups, and OOTB security settings. Complete the following steps to implement the OOTB security design.
To implement the OOTB security design:
- Review the OOTB security design: Understand the OOTB Security Groups, Roles, and Teams/Workgroups.
- Complete the User/Customer Worksheet to determine which Security Group and Teams/Workgroups to assign each User/Customer to.
- Add your people:
- Create User Profiles: Create a User Profile for each CSM User (CSM Administrator>Security>Edit Users). During this process, you will assign each person to one Security Group, and one or more Teams.
- Create Customer Profiles (Customer Records): Create a Customer Record for each Customer you support (from the CSM Desktop Client toolbar, click the New button and select Customer-Internal).
Unlike a User Profile, a Customer Record does not store account credentials or Workgroup information.
To save time, you can import users already stored in a Directory Service (ex: Active Directory). Refer to import Users/Customers.
- Explore Security design ideas.
- (Optional) Configure Security: CSM provides numerous system security settings (ex: Login, authentication, inactivity, password enforcement, etc.); you can change these, if needed, but it is not required.