Controlling Security and User Access

Surround SCM includes extensive security options that can be configured to provide as much or as little security as needed. Most organizations only need to configure group, or server-level, security. You can also set repository and branch security.

Group users by role or function before you start configuring security and adding security groups. It may be helpful to create a list of the types of users who access Surround SCM. Also consider your company’s process and define roles and permissions accordingly. A strong security model allows you to be flexible in assigning access without risking data integrity. The following questions can help you get started:

Tip: See the Security Best Practices for recommendations about user, database, and server management to keep data secure.

Example

For example, a project team may include one or more of the following:

Related Topics Link IconSee also