Navigating Cherwell's multi-tiered security model
Cherwell Service Management (CSM) was created with highly configurable security front and center; It's been a cornerstone of the platform in every release. Because of its granular and flexible design, the security features can present a labyrinth challenge to new administrators.
This guide is intended to demystify this key element to configuration and give all Cherwell admins (new and experienced) confidence when securing the CSM platform. Among other things, it includes detail around:
- Security Model (groups, roles, teams, etc.)
- Security Properties (rights, business objects, etc.)
- Security Accessories (authentication, encryption, etc.)