User guide
Authorization-related Operation
4-13
Authorization-related Operation
This section explains changing role configurations and protection resources.
• Amending Role Configurations
• Amending Protection Resource
Amending Role Configurations
Role configuration amendments may be required due to organization change.
The role configuration is changed or added as follows:
The SSO administrator uses the SSO repository and repository server as follows:
1. Change or add the role configuration in the SSO repository.
2. Change or add the role to the path configuration of the protection resource as required.
3. Change or add the role to the user entry as required.
4. Use the repository server to retrieve role information and update the cache.
Use the Interstage Management Console to select [System] > [Security] > [Single Sign-on] >
[Authentication infrastructure] > [Repository server] > [Update Role information] tab, and then click
the [Update] button.
If the repository server (update system) and the repository server (reference system) are used,
update the cache on both servers.
5. Request the business server administrator to update the access control information.
The business server administrator then operates the business server as follows: (*1).
1. Update access control information on the business server.
Use the Interstage Management Console to select [System] > [Security] > [Single Sign-on] >
[Business system] > [Business system Name] > [Update access control information] tab, and then
click the [Update] button to update the access control information.
*1 If “Execute when business server is started” is selected in [Update access control information] in the
business server environment setup, this operation is required only when the business server is running.
If “Execute manually as needed” is selected, this operation is required regardless of whether the
business server is running or stopped.
For details about the setting [Update access control information], refer to “Updating Access Control
Information”.
For details about the role of the SSO repository, refer to “Role Configuration Entry”’.