Maintenance Manual

8-7
Cisco ICM Enterprise Edition Administration Guide Release 6.0(0)
Chapter 8 ICM Partitioning
Class and Object Security
You can define any number of groups with broader or narrower rights than in these
examples. In addition to granting rights to user groups, you can also grant specific
rights to individual users. However, it is usually simpler and easier to use groups
as much as possible.
For more information about defining the security access for user groups, see
Installing and Configuring ICM Partitioning, page 8-28.
Getting Started
Before you begin setting up ICM Partitioning, take some time to plan the process.
Designing your Partitioning system carefully before beginning to implement it
ultimately makes the task easier and less error-prone. In particular, you should:
Determine tasks that need to be performed.
Create a group for each task.
Add users to groups representing the tasks the user needs to perform.
For example, one task might be to add Peripherals. To accommodate this task, you
would take the following steps:
1. Create a group name, for instance, AddPeripherals.
2. Grant the group maintenance Peripheral Class Access.
3. Assign users to the group.
See Class and Object Security, page 8-7to work out which specific access rights
you need to assign to each group. See Installing and Configuring ICM
Partitioning, page 8-28for instructions on setting up Partitioning.
Class and Object Security
This section provides information about ICM class and object security.