Overview
This video series demonstrates how user security is applied in DSP 7.1 and later. Upgrades from versions 7.0.6 or below to 7.1 or above may require changes to a client’s security roles.
NOTE: These videos are intended as supplemental material only. Do not attempt a security migration without first consulting Centralized Security Migration Manual. You can also consult Set Security for an overview of the updated process.
Migration Methods
For small installations with a low number of different application content items, the migration can be done manually. There is no need to install the Centralized Security Migration Utility.
For larger installations, the Centralized Security Migration Utility as defined in Centralized Security Migration Manual can be used to support the migration. This application is installed BEFORE the system is upgraded to DSP 7.1 (or above). This will allow detailed analysis and planning of the future security setup.
This video series demonstrates both a manual migration method and also simple and complex migrations using the Centralized Security Migration Utility.
Manual Migration
A demonstration of how to manually create the content roles and other steps rather than using the Migration Tool.
Central Security Migration Tool Overview
A brief overview of the Central Security Migration Tool to assist in deciding between the two automated migration methods.
NOTE: Each method encompasses a set of pre-upgrade steps and also a set of post-upgrade steps. Consult the pertinent section of Centralized Security Migration Manual for those detailed steps.
Central Security Migration Tool: One-to-One
An end-to-end demonstration on using the migration tool to do a simple (lift and shift) migration. This approach will fully align a DSP instance’s Security to each Governance Application.
Central Security Migration Tool: Consolidate
An end-to-end demonstration on using the migration tool to perform a custom migration. In this scenario, analysis of Governance Content is done to determine the most efficient Content Role setup for future user management. Once a Content Security Model has been designed, new Custom Content Roles can be created. Existing Governance Content can then be mapped to the Custom Content Roles and decisions about user assignment to the roles made.
Component Specific Migration
User assignment to and removal from the following DSP components is no longer performed in native applications. Instead, users must be granted access to these items via Content Roles or via direct assignment to these user using User Specific Security Definitions. This video series demonstrates how to set up user access using the new Security Management functionality in these four DSP components, with special attention to these tasks:
- Define Content Role structure needed to support ongoing User Management activities.
- Change operational processes in such a way that User access to the application content above is managed via Content Roles or User Specific Security Definitions.
- Migrate Application Content.
Central Security Management: dspConduct
Demonstration of creating user assignments to Positions by assigning a corresponding Security Definition Key Value, either directly to the user, or via the assignment of the user to a Role that contains the key value.
Central Security Management: dspCompose
Demonstration of creating user assignments to Templates/Template Roles y assigning a corresponding Security Definition Key Value, either directly to the user, or via the assignment of the user to a Role that contains the key value.
Central Security Management: dspMonitor
Demonstration of creating user assignments to Monitor Groups y assigning a corresponding Security Definition Key Value, either directly to the user, or via the assignment of the user to a Role that contains the key value.
Central Security Management: Information Steward Accelerator
Demonstration of creating user assignments to a Project Distribution y assigning a corresponding Security Definition Key Value, either directly to the user, or via the assignment of the user to a Role that contains the key value.