Joe Pluta wrote:
(That is, when managing non-QSECOFR objects. You would need to log on
with QSECOFR or a QSECOFR surrogate to manage QSECOFR-owned objects.
But for application objects, you wouldn't need QSECOFR rights.)
One last comment and then I'm going to let the thread die.
The issue is, if you're managing dozens (if not hundreds) of target
environments (possibly on dozens of systems), all with (possibly) wildly
differing authority models, the practicality of having to grant the user
running the Implementer promotion process (or the user that Implementer
adopts) the necessary authority to actually manage the authorities is
just not there.
Letting the SCM product have, under secure & controlled conditions, the
necessary authority to completely manage the security model is the most
practical solution.
Again, we're talking about separation of duties (security managers vs.
application managers, developers vs. QA vs. managers, etc). I honestly
don't think ANYONE could manage ALL the various authorities in a
reasonable way.
This will be my last comment on the topic ... I've got to get a bite to
eat before the iSocial / CUDS.
If anyone would like to pursue this topic further ... contact me
privately and I'll be happy to. I suspect I could even get a copy of
our white paper that describes Implementer's use of QSECOFR adopting
programs.
david
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.