Design a security scenario
Design the access control list (ACL)
Implement design tools for security
Implement design changes |
Implement the ACL
Update the ACL |
Set up and authorize users and groups
Update the public address book (PAB)
Manage the server
Propagate replication
Manage user issues |