Planning security policies

Before you begin configuring security policies, determine the security needs of your organization and then plan your security strategy.

First, determine how many security roles and project roles you need. Then, determine whether you need to create multiple security policies or whether you can simply modify the Global policy to meet your needs:

*
*
*

As a best practice, try to implement the smallest number of security policies possible. Within a single security policy you can configure different permissions for each object type and for each marketing object template based on security roles. Additionally, for each project template you can configure different security role and project role permissions for each tab (custom and default) for both the projects and the requests.

When you set up permissions for the roles, remember that the individual permission settings are granular. For example, if you want users in a particular role to be able to edit the Summary tab of a project, you must grant that role both Edit and View permissions. If you forget to select View permissions, users in that role will never see the Summary tab so their permission to edit it is useless. In another example, it would not make sense to grant permission to post messages without also granting permission to read them.



IBM Unica Marketing Operations
 
8.5.0
For more information, see our support and community site: Customer Central