This checklist is primarily intended for those installations that do not use the IBM® Enterprise Records application.
Step | Reference | |
---|---|---|
☐ | Determine your need for the extra level of security provided by markings. | Markings |
☐ | Choose the classes that will be marking-enabled. Design and apply their default instance security permissions, as well as how instances of these classes will be secured by security parents (folders) and security policies. | About access rights |
☐ | Create the marking set, create a string property template assigned to the marking set, add a property to a class, create instances of the class, set the markings on those instances. | Create a marking set |
☐ | Confirm that the effective security created by markings plus the FileNet® P8 security model fulfills your security design. | |
☐ | (optional) Create and save a search or search template that will find objects that contain particular markings. | Create a simple search or search template |