Unsupported content


This version of the documentation is no longer supported. However, the documentation is available for your convenience. You will not be able to leave comments.

Administering security

In BMC Server Automation, approaches to security vary, depending on which system components are communicating. The following graphic illustrates possible communication legs within a BMC Server Automation system.

See Security for different communication legs for a discussion of the security approaches that are possible with each leg and references to any implementation procedures required.

For a general description of the approaches to security that are possible with BMC Server Automation, including basic security concepts, see Security.

The following topics provide more information about administering security:

Was this page helpful? Yes No Submitting... Thank you