Security

Security

Managing SpringCM users and contacts in the Address Book

About this course

  • Define security groups
  • Understand security permissions
  • Best practices for managing security groups

Curriculum

  • Introduction (1 of 6)
  • Security Introduction (2 of 6)
  • Security Demonstration & Practice (3 of 6)
  • Assessment: Security (4 of 6)
  • Inherited vs. Explicit Security (5 of 6)
  • Conclusion (6 of 6)

About this course

  • Define security groups
  • Understand security permissions
  • Best practices for managing security groups

Curriculum

  • Introduction (1 of 6)
  • Security Introduction (2 of 6)
  • Security Demonstration & Practice (3 of 6)
  • Assessment: Security (4 of 6)
  • Inherited vs. Explicit Security (5 of 6)
  • Conclusion (6 of 6)