Chapter 8. Implementing Security Roles

In this chapter, we will cover:

  • Viewing basic settings for Security roles
  • Adding users to the End User role
  • Creating and managing Service Request roles
  • Creating and managing Incident Management roles
  • Creating and managing Problem Management roles
  • Creating and managing Change and Release Management roles
  • Creating hybrid roles
  • Configuring the self-service catalog security role
  • Listing SCSM security role details with PowerShell

Introduction

This chapter discusses the security model used in System Center 2012 Service Manager (SCSM) and provides the configuration steps required to personalize the security model to your needs.

Security is applied across all objects you can manage in SCSM. The security model in use is commonly ...

Get Microsoft System Center 2012 Service Manager Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.