Menu

IBM Case Foundation 5.2.1 – Security – f232gspl

Course #:

Duration: 2.4 Hours

This course is designed to introduce workflow system security concepts, and to provide practice working with workflow system security. You work with an IBM Case Foundation 5.2.1 system to complete lesson exercises.

If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms

Objectives

After completing this course, students should be able to:

  • Inspect workflow system security settings.
  • Identify and resolve workflow system security-related issues.
  • Configure security for a workflow system.

Audience

A Workflow System Administrator is responsible for day-to-day operations of a production IBM Case Foundation workflow application.

A Workflow System Administrator is typically required to help workflow participants to do the following tasks:

  • Locate work and complete workflows.
  • Respond to management decisions that require changes to work items.
  • Gather information about workflow activity to help management make business decisions.

A Workflow Author is responsible for planning, designing, developing, and testing a workflow application within a development environment.

Prerequisites

Before taking this course, students should have the following knowledge and skills:

  • Familiarity with Windows 2008 operating systems.
  • General knowledge of P8 Platform security concepts.
  • General workflow terminology:
    • Workflow
    • Workflow definitions
    • Queues
    • Rosters.
  • Start a P8 Platform system.
  • Familiarity with P8 Platform administration interfaces, including:
    • Administration Console for Content Platform Engine
    • IBM Content Navigator
    • Process Configuration Console
    • Process Designer

Topics

Security overview

  • Inspect workflow system security settings.

Security configuration

  • Add users and groups to a workflow system.
  • Identify and resolve security issues.

Contact us regarding the training