Microsoft System Center 2012 Orchestrator provides you with the ability to delegate and secure components in its infrastructure. The process to create this security model differs from some of the other System Center family of products. In this recipe we will discuss and provide steps to configure a security model using a real world scenario.
You must have a fully deployed System Center 2012 Orchestrator environment in order to complete this recipe.
In our example environment we have five roles in scope for our initial security configuration: