IBM Emptoris Contract Management-Security Model (V10.0.1) – 6d115gwpl
Course #:
Duration: 1.6 Hours
This course covers the important topic of Security. In it, we discuss in detail the two pillars of Contract Management functionality that were deployed together to craft a viable, effective Security system for our training platform.
If the Learning Objectives included in this course description imply the presence of teaching content that interests you, open the course and use the Table of Contents to go directly to the content you require.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.
http://www.ibm.com/training/terms
Objectives
Security Overview
- What is the Relevance to you of the Training Platform Security Model
User Groups and Permission Groups
After completing this lesson, you should be able to:
- Describe the role of a User Group.
- Describe the role of Permissions and Permission Groups.
Pillar One: Job Roles, User Groups and Permission Groups
After completing this lesson, you should be able to:
- Describe the role of Job Roles in our Security System
- Describe the role of User Groups and Permission Groups vis-a-vis Job Role.
Pillar Two: Organization as a Security Vehicle
After completing this lesson, you should be able to:
- Demonstrate an understanding of the Organizational structure of the version of Contract Management that is used in class.
- Describe the role and importance of a contract’s Owning Organization.
- Describe the role and importance of the relative position of a User Id in a Contract Management system’s overall Organization structure.
- Describe the relationship between Owning Organization and User ID Organizational placement in determining contract visibility.
Audience
This course is designed for Contract Creators.
Prerequisites
None
Topics
- Security Overview
- User Groups and Permission Groups
- Pillar One: Job Roles, User Groups and Permission Groups
- Pillar Two: Organization as a Security Vehicle