IBM Security Access Manager V9.0, Deployment Professional
Question No. 1
A company is concerned that it possesses data in the user registry which belongs to several companies that are sharing an IBM Security Access Manager (ISAM) V9.0 deployment. The ISAM deployment professional wants to separate the user registry data so there is no data overlap and data integrity is maintained.
How can this be achieved in an ISAM environment?
Choose the correct option from the given list.
01 / 138