Table of Contents

Search

  1. Preface
  2. Introduction to MDM Hub Security
  3. Resources
  4. Roles
  5. Users and User Groups
  6. Security Providers
  7. Application Level Security
  8. Certificate-Based Authentication
  9. Password Hashing
  10. Appendix A: Glossary

Configuration Tasks for Security Scenarios

Configuration Tasks for Security Scenarios

The following table shows the security configuration tasks that pertain to each of the security implementation scenarios. If a cell contains a "Yes" then the associated task occurs within the
MDM Hub
. If a cell contains a "No" then the associated task occurs externally to the
MDM Hub
.
Service / Task
Internal Policy Decision Points
External User Directory
RoleNobased Centralized Policy Decision Points
Comprehensive Centralized Policy Decision Points
Configure
MDM Hub
users
Yes
Yes
 No
 No
Use external authentication
 No
Yes
 No
 No
Assign users to the current
Operational Reference Store
database
Yes
Yes
 No
 No
Manage the global password policy
Yes
 No
 No
 No
Configure user groups
Yes
Yes
 No
 No
Secure
MDM Hub
resources
Yes
Yes
Yes
Yes
Set the status of a
MDM Hub
resource
Yes
Yes
Yes
Yes
Configure roles
Yes
Yes
Yes
 No
Map internal roles to external roles
 No
 No
Yes
 No
Assign resource privileges to roles
Yes
Yes
Yes
 No
Manage security providers
 No
Yes
Yes
Yes
Assign roles to users and user groups
Yes
Yes
 No
 No
If you are using third-party security providers to handle any portion of security in your
MDM Hub
implementation, see configuration instructions from your security provider.

0 COMMENTS

We’d like to hear from you!