IBM InfoSphere Enterprise Records uses the IBM FileNet P8 security model to provide a secure environment for storing, accessing, and disposing of records. Specifically, IBM InfoSphere Enterprise Records uses default instance security, security inheritance, security markings, and security proxies. In addition, IBM InfoSphere Enterprise Records provides security roles that define which IBM InfoSphere Enterprise Records tasks a user in a role can perform.
In IBM InfoSphere Enterprise Records, security settings control user access to various IBM InfoSphere Enterprise Records objects such as record categories, disposition schedules, and file plans. The system administrator or the records administrator defines the general security permissions for users and groups. Depending on the assigned access permissions, users can define the security settings while creating an object or when viewing the object's information page.
NOTE Some security proxies can conflict with IBM InfoSphere Enterprise Records. Before you declare documents as records, remove any security proxies already in effect. Check with your system administrator for additional information.
For general information about IBM InfoSphere Enterprise Records security, see Security for IBM InfoSphere Enterprise Records.
For additional informtion about IBM InfoSphere Enterprise Records security roles, see IBM InfoSphere Enterprise Records security roles.
For additional information about record security, inherited security, and document security, see Object security.
For additional information about security markings, see Security Markings.