IT Training, Desktop Application Courses
  • Back
  • Course Catalogue
      • Technical IT Training
      • Desktop Applications
      • CyberSecurity
      • Custom Group Solution
      Technical IT Training
       

      VENDORS

        • Microsoft
        • Cisco
        • Amazon
        • Red Hat
        • CompTIA
        • Guaranteed to run courses

      TECHNOLOGIES

      • CyberSecurity
      • Cloud Computing
      • Networking
      • Business Analysis
      • Programming
      • Databases
      • Artificial Intelligence
      10% off promo
      Desktop Applications

      Microsoft

      • Excel
      • Word
      • Teams
      • PowerPoint
      • Outlook
      • Guaranteed to run

      Adobe

      • Photoshop
      • Illustrator
      • InDesign
      • Premiere Pro
      • Acrobat
      • After Effects
      • LiveCycle Designer

      Other Vendors

      • Kofax
      • WCAG
      • Foxit
      • Programming
      CyberSecurity

      Ultimate IT Courses delivers a focused, career-ready cybersecurity program offered exclusively through our Mile2 partnership.

      Designed for both individuals and teams, the program builds practical, job-relevant skills across core security concepts, threat awareness, governance and risk fundamentals, and real-world defensive practices.

      Flexible delivery options make it easy to train remotely or in a live classroom setting, with a consistent learning path that supports confident progress from foundational knowledge to advanced application.

      Learn more>>>

      Custom Group Solution

      Customized Group Training Solutions are built for organizations that want training to match reality—your goals, your technology stack, your timelines, and your team’s current skill levels. Instead of forcing employees into generic public classes, Ultimate IT Courses designs private, instructor-led programs that fit how your business actually operates, with measurable outcomes and scheduling that won’t derail productivity. Learn more >>>

  • About Us
      Based in Ottawa, Ontario, Ultimate IT Courses combines enterprise-level course offerings with the flexibility of a boutique provider.
      Read More
      • About Ultimate IT Courses
      • About Mile2 Canada
      • Course Catalogue
      • Contact us
  • Resources
  • Contact us
Login
IBM Sterling Order Management (V10.0) Configuring Participant Modeling, Process Modeling, and User Security

IBM Sterling Order Management (V10.0) Configuring Participant Modeling, Process Modeling, and User Security

by Mile2 Canada

This course begins with an overview of Sterling Order Management and the business models it supports. The course then describes how to define participants and create organizations and users.  Through a combination of procedural information and exercises, students will learn about topics such as how to assign attributes to the different roles defined in Sterling Order Management and configure user access policies.

This product is currently out of stock and unavailable.

SKU: N/A Categories: IBM, Other, Technical Tag: In-Class
  • Description

The course also covers Process Modeling features, including how to set up a business process workflow for an organization. Students are then introduced to statuses, conditions, transactions, and other components of a process type pipeline. The course then describes how to create a process type pipeline.

Who should attend

Order Management developers and implementers

Prerequisites

Before taking this course, students should have completed:

  • Intro to Sterling Order Management
  • DL25011G - IBM Sterling Order Management Fundamentals

 

Course Objectives

After completing this course, students should be able to:

  • Map the participant details to their appropriate roles using Application Platform.
  • Create users and configure user security features using Application Platform.
  • Describe Process Modeling.
  • Create the following components:
  • Statuses, Conditions, and Services
  • Events and Event Handlers
  • Actions and Transactions
  • Create pipelines and pipeline determination rules.

Outline: IBM Sterling Order Management (V10.0) Configuring Participant Modeling, Process Modeling, and User Security (6F101G)

Course Overview

Unit 1: Overview of Applications Manager

Unit 2: Configuring Organizations

Unit 3: Creating Users and Configuring Access Policies

Unit 4: Case Study

Unit 5: Overview of Process Modeling

Unit 6: Configuration Basics 

Related products

  • website accessibility training
    Select options
    This product has multiple variants. The options may be chosen on the product page
    Foxit PhantomPDF: Accessible PDF Forms with PDF U/A and WCAG 2.1  by Mile2 Canada
  • database training
    Select options
    This product has multiple variants. The options may be chosen on the product page
    ONTAP Data Protection Administration by Mile2 Canada
  • Google Cloud Fundamentals: Big Data and Machine Learning
    Select options
    This product has multiple variants. The options may be chosen on the product page
    Google Cloud Fundamentals: Big Data and Machine Learning by Mile2 Canada
  • Cisco Logo
    Select options
    This product has multiple variants. The options may be chosen on the product page
    Troubleshooting Cisco Application Centric Infrastructure by Mile2 Canada

Newsletter Subscription

Get practical IT training updates, certification tips, and new course announcements.

loader
About Ultimate IT Courses
Based in Ottawa, Ontario, Ultimate IT Courses combines enterprise-level course offerings with the flexibility of a boutique provider. Read More
Facebook-f Linkedin
Courses
  • Course Catalogue
  • Certifications
  • Training Resources
Useful Links
  • Terms and conditions
  • Privacy Policy
  • Refund Policy
Contact Us
  • (613) 416-8898
  • info@ultimateitcourses.ca
  • 451-207 Bank Street Ottawa, ON K2P 2N2 Canada
  • Copyright © 2026 Mile2 Canada. All Rights Reserved.
HomeSearchAccount