Steps to Implement the OOTB Security Design
CSM is shipped with an OOTB security design complete with OOTB Security Groups, OOTB Roles, OOTB Teams/Workgroups, and OOTB security settings. Complete the following steps to implement the OOTB security design.
To implement the OOTB security design:
- Review the OOTB security design: Understand the OOTB Security Groups, Roles, and Teams/Workgroups.
 - Complete the User/Customer Worksheet to determine which Security Group and Teams/Workgroups to assign each User/Customer to.
 - Add your people: 
        
- Create User Profiles: Create a User Profile for each CSM User (CSM Administrator>Security>Edit Users). During this process, you will assign each person to one Security Group, and one or more Teams.
 - Create Customer
              Profiles (Customer Records): Create a Customer Record for each Customer
            you support (from the 
            CSM Desktop Client toolbar, click the 
            New button and select 
            Customer-Internal). 
            
Unlike a User Profile, a Customer Record does not store account credentials or Workgroup information.
Tip: To save time, you can import users already stored in a Directory Service (ex: Active Directory). Refer to import Users/Customers.
 
 - Explore Security design ideas.
 - (Optional) Configure Security: CSM provides numerous system security settings (ex: Login, authentication, inactivity, password enforcement, etc.); you can change these, if needed, but it is not required.
 
