FREE CA Technologies Education Webinar Series this Month!

Discussion created by kolja01 on Dec 13, 2010
Latest reply on Mar 15, 2012 by kolja01

Leveraging Role Engineering to Create Role Based Access Control in CA Role & Compliance Manager

As organizations start deploying Identity and Access Management (IAM) solutions, it is becoming increasingly important to devise a common set of roles that can be reused, over and over again, as opposed to defining roles every time an IAM component is deployed. Role-based access control (RBAC) is becoming the norm for managing entitlements within commercial systems and applications. In addition, RBAC can play a significant role in establishing a model for enforcing security within organizations.

Join CA Technologies for a complimentary webinar showing you how to setup user data within CA Role and Compliance Manager so that you can create a role based access control system and easily grant the appropriate permissions to your end users.

Through a live demonstration, attendees will learn:

User Access Problems in Today’s Business Environment
What is the problem to be solved?
How can we solve this problem?
Why Roles?
What are Roles?

Role Management
What is the Role Management cycle?
What tools are available to help with this process?


CA Role and Compliance Manager

Demonstrate CA Role and Compliance Manager
Create roles from existing data

What data is needed?

How is it created?

How is it used?

Join us and take advantage of this unique opportunity to expand your CA Role and Compliance Manager knowledge and see how you can contribute to your User Management success. If you cannot attend the live session, we will be offering the recording on demand at a later date.

*This session is intended for beginners who would like to learn more in general about roles within IT systems. There will also be a specific focus on how to use CA Role & Compliance Manager.

Duration 90 min.

Event dates

[size=5]20 Dec 2010 4:00 p.m. - 5:30 p.m. EST

21 Dec 2010 11:00 a.m. -12:30 p.m. EST