SlideShare a Scribd company logo
© IBM Corporation 1
Presented by:
Securing the Automation of Application
Deployment with UrbanCode Deploy
Joanne Scouler
WW Cloud Sales
Enablement
jscouler@us.ibm.com
@joscouler on twitter
Thomas Hudson
Information Architect
thudson@us.ibm.com
November 5, 2015
© IBM Corporation 2
Security agenda
– Steps in setting up security
– Authorization
– Authentication
– Role configuration
– Guidance on configuring roles and permissions
– Security model
– Security model example
– Team configuration
– Approvals and notifications
– Statuses and gates
© IBM Corporation 3
Security objectives
In this module you learn how to:
• Create authorization realms and user groups
• Manage users in authentication realms
• Create and define roles and permissions for security
• Create teams
• Set up notifications and approvals
• Set up statuses and gates
© IBM Corporation 4
Guidelines for setting up security
1. Create an authorization realm.
Authorization realms handle user groups.
2. Create an authentication realm.
The authentication realm is used to determine a user's identity
within an authorization realm. (LDAP, AD, or SSO)
3. Create roles and define permissions for them.
For most situations, the default permission types should be
adequate.
4. Create or import users.
5. Create teams and assign users to them.
© IBM Corporation 5
IBM UrbanCode Deploy security
© IBM Corporation 6
Authorization realms
The Authorization Realms pane is used to create authorization realms and user
groups. Groups can be imported from external systems, such as LDAP.
© IBM Corporation 7
Authentication realms
• Authentication realms determine user identity within authorization realms.
• Users can be created manually or imported from external systems.
© IBM Corporation 8
Role configuration
– Roles provide permissions to users.
– A role is a set of permissions. Typically, the permissions in a
role define a particular activity that a user might do. IBM®
UrbanCode Deploy provides one role, the Administrator role,
which has all available permissions.
– Users are granted permissions by being assigned to roles.
When assigned to a role, a user is automatically granted all
permissions that are defined for the role. Typical activities
include changing or running an item, such as an application
process, or modifying security settings.
© IBM Corporation 9
Role configuration
© IBM Corporation 10
Guidance on configuring roles and permissions
When defining the roles for your organization, start by keeping the roles
simple, but sufficient to carry out the appropriate work.
Role Permissions
Configurator Resources (Create, Edit, View)
Application (Create, Edit, Manage Snapshots, Run Comp Process,
View)
Environment (Create, Edit, Execute, View)
Component (Create, Edit, Manage Versions, View)
Component Template (Create, Edit, View)
Release Engineer ( Resources (View)
Application (View, Manage Snapshots, Run Component Applications)
Environment (View and Execute)
Component (View)
Component Template (View)
Approver Resources (View)
Application (View)
Environment (View and Execute)
Component (View)
Component Template (View)
© IBM Corporation 11
Kinds of permissions
– Permissions generally fall into one of the following categories:
• The ability to view, modify or work with a specific object.
• The ability to create new object
• The ability to see some element of the User Interface
• The ability to manipulate the system/security as a whole, such as the
ability to define users and groups
– Permissions are cumulative
• One user may be assigned multiple roles on multiple teams. When considering a
specific capability, such as the ability to edit a certain object, a user may have
multiple relevant roles in relationship to that object. Permissions are cumulative –
as long as there is one role that provides the given Permission, the user has the
Permission, even if other roles don't provide the Permission.
© IBM Corporation 12
Team and role-based security model
© IBM Corporation 13
Security model example
© IBM Corporation 14
Security model – Defining roles
© IBM Corporation 15
Security model – Defining roles
© IBM Corporation 16
Team lead role
• It is useful to have role that manages team membership without
requiring the Administrator.
• Give the Add Team Members permission to the role designed to
manage the team.
• Users with this role can add and remove users from their team.
• Access the team manager feature by selecting My Profile > My
Teams.
© IBM Corporation 17
Defining and maintaining roles
When you select an
object, it lists all of the
defined Types of that
object. You define
permissions by Type
within a role.
You can select the menus
that the role will be able to
see in the Web User
Interface
© IBM Corporation 18
Mapping objects to a team
• To create an object, you must have the Create permission for the
object type. To create a component, for example, you must have a
role with the Create Component permission.
• When you create an object, such as a component, your teams are
automatically mapped to the object. You can change your user
preferences to modify this behavior.
• To map a team to an existing object, you must have a role with the
Manage Security permission.
© IBM Corporation 19
Steps for setting up approvals
– 1. Ensure that the users doing the approval belong to the appropriate role
– 2. Enable approvals on the desired environment
– 3. Identify the roles that will provide the approval
– 4. Define the approval process on the application
© IBM Corporation 20
Define statuses for components
Define the set of component version statuses
© IBM Corporation 21
Define the gates on environments
On the Application
configuration, define the gates
© IBM Corporation 22
Resources
– A Guide to Security Configuration in IBM UrbanCode Deploy
– UrbanCode Deploy Knowledge Center
© IBM Corporation 23
Summary
– In this module you learned how to:
• Create and define roles and permissions for security
• Manage users in authentication realms
• Create authorization realms and user groups
• Create teams
• Set up notifications and approvals
• Create statuses and gates
© IBM Corporation 24© IBM Corporation 24
Accelerating Digital Business

More Related Content

PDF
The Forgotten Customer (XPDays 2011)
PDF
The Forgotten Customer (Socrates 2011)
DOC
Krishna IT CV
DOCX
Preliminary Task Summer 2016: Planning
PDF
AIM Final Plans Book
DOCX
Equipo Drive Herramientas digitales
DOC
GHAIDAA c.v 2014 business developer or traning and development
PDF
System 4
The Forgotten Customer (XPDays 2011)
The Forgotten Customer (Socrates 2011)
Krishna IT CV
Preliminary Task Summer 2016: Planning
AIM Final Plans Book
Equipo Drive Herramientas digitales
GHAIDAA c.v 2014 business developer or traning and development
System 4

Viewers also liked (13)

PPT
Portfolio
PPTX
Encopresis
PPTX
El Codigo ARCOIRIS. Objeto de estudio
PPTX
Terrestrial LiDAR and Photogrammetry; a Historic Site Comparative
PDF
Mecanisme de gestion de la Secheresse en Tunisie
PDF
Llista de vocabulari 4 - Cicle mitjà
PPTX
Protocole ARP/RARP
PPT
SURVEYING - Photogrammetry (CE 115) Lec2 By Afia Narzis Spring 2016
PPTX
Different Arduino Boards
PPTX
Legyen élmény a fizetés (HWSW App 2015 Nov)
PDF
Early Renaissance - Italy, 1400-1500
PPT
Introduction to Malware
DOCX
Resume - Ravi
Portfolio
Encopresis
El Codigo ARCOIRIS. Objeto de estudio
Terrestrial LiDAR and Photogrammetry; a Historic Site Comparative
Mecanisme de gestion de la Secheresse en Tunisie
Llista de vocabulari 4 - Cicle mitjà
Protocole ARP/RARP
SURVEYING - Photogrammetry (CE 115) Lec2 By Afia Narzis Spring 2016
Different Arduino Boards
Legyen élmény a fizetés (HWSW App 2015 Nov)
Early Renaissance - Italy, 1400-1500
Introduction to Malware
Resume - Ravi
Ad

Similar to Securitywebinar3 tph3 (20)

PDF
Securing the Automation of Application Deployment with UrbanCode Deploy
PPT
Application module slides
PPTX
Developing Secure IBM i Applications
DOC
Security lab
PDF
Microsoft Dynamics CRM Certification Training
PDF
cases for IBM xgs5000 (5.0) demo
PDF
Product Overview: The New IBM UrbanCode Deploy 6.0
PPTX
Overview
PPTX
UrbanCode Deploy course and product overview slides
PDF
Tip from ConnectED 2015: Best and Worst Practices Deploying IBM Connections
PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PPTX
Mobility 101 : Provision
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PDF
Addressing identity, access and compliance requirements using ibm tivoli iden...
DOC
Authorisation Concept In SAP | http://sapdocs.info
PDF
IBM Security Software Solutions
PPTX
Mobility 201 : Productivity
PDF
Securing your mobile business with ibm worklight
PPTX
Mobility 301 : Protect
Securing the Automation of Application Deployment with UrbanCode Deploy
Application module slides
Developing Secure IBM i Applications
Security lab
Microsoft Dynamics CRM Certification Training
cases for IBM xgs5000 (5.0) demo
Product Overview: The New IBM UrbanCode Deploy 6.0
Overview
UrbanCode Deploy course and product overview slides
Tip from ConnectED 2015: Best and Worst Practices Deploying IBM Connections
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Mobility 101 : Provision
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
Addressing identity, access and compliance requirements using ibm tivoli iden...
Authorisation Concept In SAP | http://sapdocs.info
IBM Security Software Solutions
Mobility 201 : Productivity
Securing your mobile business with ibm worklight
Mobility 301 : Protect
Ad

More from Joanne Scouler (6)

DOC
Resourceslab fixed
PPT
Resources Module slides
PPT
Components module slides
DOC
Components lab
DOC
Applications lab
DOC
Deployment module lab
Resourceslab fixed
Resources Module slides
Components module slides
Components lab
Applications lab
Deployment module lab

Recently uploaded (20)

PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Nekopoi APK 2025 free lastest update
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
ai tools demonstartion for schools and inter college
PDF
Digital Strategies for Manufacturing Companies
PDF
AI in Product Development-omnex systems
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
medical staffing services at VALiNTRY
PPTX
Transform Your Business with a Software ERP System
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPT
Introduction Database Management System for Course Database
PDF
top salesforce developer skills in 2025.pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Odoo Companies in India – Driving Business Transformation.pdf
Nekopoi APK 2025 free lastest update
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Odoo POS Development Services by CandidRoot Solutions
How Creative Agencies Leverage Project Management Software.pdf
ai tools demonstartion for schools and inter college
Digital Strategies for Manufacturing Companies
AI in Product Development-omnex systems
Softaken Excel to vCard Converter Software.pdf
medical staffing services at VALiNTRY
Transform Your Business with a Software ERP System
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Introduction Database Management System for Course Database
top salesforce developer skills in 2025.pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Upgrade and Innovation Strategies for SAP ERP Customers
ManageIQ - Sprint 268 Review - Slide Deck
Lecture 3: Operating Systems Introduction to Computer Hardware Systems

Securitywebinar3 tph3

  • 1. © IBM Corporation 1 Presented by: Securing the Automation of Application Deployment with UrbanCode Deploy Joanne Scouler WW Cloud Sales Enablement jscouler@us.ibm.com @joscouler on twitter Thomas Hudson Information Architect thudson@us.ibm.com November 5, 2015
  • 2. © IBM Corporation 2 Security agenda – Steps in setting up security – Authorization – Authentication – Role configuration – Guidance on configuring roles and permissions – Security model – Security model example – Team configuration – Approvals and notifications – Statuses and gates
  • 3. © IBM Corporation 3 Security objectives In this module you learn how to: • Create authorization realms and user groups • Manage users in authentication realms • Create and define roles and permissions for security • Create teams • Set up notifications and approvals • Set up statuses and gates
  • 4. © IBM Corporation 4 Guidelines for setting up security 1. Create an authorization realm. Authorization realms handle user groups. 2. Create an authentication realm. The authentication realm is used to determine a user's identity within an authorization realm. (LDAP, AD, or SSO) 3. Create roles and define permissions for them. For most situations, the default permission types should be adequate. 4. Create or import users. 5. Create teams and assign users to them.
  • 5. © IBM Corporation 5 IBM UrbanCode Deploy security
  • 6. © IBM Corporation 6 Authorization realms The Authorization Realms pane is used to create authorization realms and user groups. Groups can be imported from external systems, such as LDAP.
  • 7. © IBM Corporation 7 Authentication realms • Authentication realms determine user identity within authorization realms. • Users can be created manually or imported from external systems.
  • 8. © IBM Corporation 8 Role configuration – Roles provide permissions to users. – A role is a set of permissions. Typically, the permissions in a role define a particular activity that a user might do. IBM® UrbanCode Deploy provides one role, the Administrator role, which has all available permissions. – Users are granted permissions by being assigned to roles. When assigned to a role, a user is automatically granted all permissions that are defined for the role. Typical activities include changing or running an item, such as an application process, or modifying security settings.
  • 9. © IBM Corporation 9 Role configuration
  • 10. © IBM Corporation 10 Guidance on configuring roles and permissions When defining the roles for your organization, start by keeping the roles simple, but sufficient to carry out the appropriate work. Role Permissions Configurator Resources (Create, Edit, View) Application (Create, Edit, Manage Snapshots, Run Comp Process, View) Environment (Create, Edit, Execute, View) Component (Create, Edit, Manage Versions, View) Component Template (Create, Edit, View) Release Engineer ( Resources (View) Application (View, Manage Snapshots, Run Component Applications) Environment (View and Execute) Component (View) Component Template (View) Approver Resources (View) Application (View) Environment (View and Execute) Component (View) Component Template (View)
  • 11. © IBM Corporation 11 Kinds of permissions – Permissions generally fall into one of the following categories: • The ability to view, modify or work with a specific object. • The ability to create new object • The ability to see some element of the User Interface • The ability to manipulate the system/security as a whole, such as the ability to define users and groups – Permissions are cumulative • One user may be assigned multiple roles on multiple teams. When considering a specific capability, such as the ability to edit a certain object, a user may have multiple relevant roles in relationship to that object. Permissions are cumulative – as long as there is one role that provides the given Permission, the user has the Permission, even if other roles don't provide the Permission.
  • 12. © IBM Corporation 12 Team and role-based security model
  • 13. © IBM Corporation 13 Security model example
  • 14. © IBM Corporation 14 Security model – Defining roles
  • 15. © IBM Corporation 15 Security model – Defining roles
  • 16. © IBM Corporation 16 Team lead role • It is useful to have role that manages team membership without requiring the Administrator. • Give the Add Team Members permission to the role designed to manage the team. • Users with this role can add and remove users from their team. • Access the team manager feature by selecting My Profile > My Teams.
  • 17. © IBM Corporation 17 Defining and maintaining roles When you select an object, it lists all of the defined Types of that object. You define permissions by Type within a role. You can select the menus that the role will be able to see in the Web User Interface
  • 18. © IBM Corporation 18 Mapping objects to a team • To create an object, you must have the Create permission for the object type. To create a component, for example, you must have a role with the Create Component permission. • When you create an object, such as a component, your teams are automatically mapped to the object. You can change your user preferences to modify this behavior. • To map a team to an existing object, you must have a role with the Manage Security permission.
  • 19. © IBM Corporation 19 Steps for setting up approvals – 1. Ensure that the users doing the approval belong to the appropriate role – 2. Enable approvals on the desired environment – 3. Identify the roles that will provide the approval – 4. Define the approval process on the application
  • 20. © IBM Corporation 20 Define statuses for components Define the set of component version statuses
  • 21. © IBM Corporation 21 Define the gates on environments On the Application configuration, define the gates
  • 22. © IBM Corporation 22 Resources – A Guide to Security Configuration in IBM UrbanCode Deploy – UrbanCode Deploy Knowledge Center
  • 23. © IBM Corporation 23 Summary – In this module you learned how to: • Create and define roles and permissions for security • Manage users in authentication realms • Create authorization realms and user groups • Create teams • Set up notifications and approvals • Create statuses and gates
  • 24. © IBM Corporation 24© IBM Corporation 24 Accelerating Digital Business