Planning read/write security rules

You can set up read/write security at many levels. You can have only a small set of rules, or be restrictive in who has access to what information. For best results, become familiar with the group security capabilities by reading the information in this section, and then define a small set of rules. Then you can understand how the rules work and test a small set of rules before defining additional rules.

About this task

If you want to implement read/write security rules, you have probably already identified some area of your change tracking system where you need to regulate access. What follows are a few examples of how you might want to control how information is viewed in IBM® Rational® Change.

Procedure

  • To plan read/write security rules:

    1. Understand how read/write security works in your organization.
    2. Plan your read/write security and define your groups.
    3. Define your rules.
    4. Review your change request process and lifecycle.

    Feedback