Planning security

One of the first things to do, before you start adding security groups, is to group users together based on function. It may be helpful to create a list of the types of users who will be accessing Surround SCM and what their needs are. You should also consider your company’s process and define roles and permissions accordingly. A strong security model allows you to be flexible in assigning access without risking data integrity. The following questions can help you get started: