IBM Enterprise Records, Version 5.1.2    

FileNet P8 security

IBM® Enterprise Records uses the IBM FileNet® P8 security model to provide a secure environment for storing, accessing, and disposing of records. Specifically, IBM Enterprise Records uses default instance security, security inheritance, security markings, and security proxies.

In addition, IBM Enterprise Records provides security roles that define which IBM Enterprise Records tasks a user in a role can perform.

Attention: IBM Enterprise Records is designed to use the RecordInformation property defined on the record object store with the Security Proxy Type property set to the FULL or INHERITANCE setting. For more information about the proxy types, see the SecurityProxyType Enumeration entry in the Content Engine .NET API Reference.

In IBM Enterprise Records, security settings control user access to various IBM Enterprise Records objects such as record categories, disposition schedules, and file plans. The system administrator or the records administrator defines the general security permissions for users and groups. Depending on the assigned access permissions, users can define the security settings while creating an object or when viewing the information page of an object.

Important: Some security proxies can conflict with IBM Enterprise Records. Before you declare documents as records, remove any security proxies already in effect. Check with your system administrator for additional information.


Feedback

Last updated: November 2013
managing_security.htm

© Copyright IBM Corporation 2013