In BMC Server Automation, approaches to security vary, depending on which system components are communicating. The following graphic illustrates possible communication legs within a BMC Server Automation system.
See Security for different communication legs for a discussion of the security approaches that are possible with each leg and references to any implementation procedures required.
For a general description of the approaches to security that are possible with BMC Server Automation, including basic security concepts, see Security.
The following topics provide more information about administering security:
- Generating a user information file
- Using the blcred utility
- Using certificates to secure communication between clients and Application Servers
- Implementing single sign-on
- System capabilities related to security
- Implementing security for communication legs
- Implementing authentication
- Managing access
- How to deny NSH access