SecHard

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

  1. Step: Creation of users;

Determining the people who will access the Pam Module.

Deciding the User types to be opened (Local or AD Account)

Determining whether the Users to be opened will use a System account or AD account when connecting to resources.

Creating users on Sechard.

  1. Step

Creation of Roles

  •   Determining the role matrices for the areas that users will access.

  •   Granting sufficient permissions for the parts that will provide access. (Create/Read/Write/Delete)

  1. Step

Assigning resorces to roles

Associete the resources that people who will be assigned to the Role will have access to,

  1. Step

Assigning resorces to roles

Associete the resources that people who will be assigned to the Role will have access to,

  1. Step

Implementation of White List / Black List structure

If there is a command restriction to be applied to users, creating White list / Black list groups and assigning them to roles.

  • No labels

0 Comments

You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.