Planning

The following table describes the process for planning the implementation or deployment of the product, and provides links to the applicable topics:  

Planning task Benefit
Plan the deployment

Familiarize yourself with the BMC Server Automation architecture.

If you are implementing provisioning with BMC Server Automation, review the Implementation process for provisioning and Planning for provisioning topics.

If you are implementing patch management with BMC Server Automation, review the Implementation process for patch management and Planning for patch management topics.

If you are implementing compliance content, review the Implementation process for compliance content analysis.

Review the topics in the Deployment use cases section to:

Plan for scaling the environment

Review the Sizing and scalability considerations topic to review guidelines for sizing and scaling a BMC Server Automation Application Server. Note that the settings for some configuration parameters related to size and scale can affect Application Server performance.

Tip: For the latest sizing and scalability recommendations refer to the BMC Server Automation Sizing Guide in the BMC Communities. 

Review system requirements

The System requirements section provides information about:


Review information about permissions and authorizations

The Permissions section provides information about:

Plan for security

The Security planning  section provides overview information about the security capabilities of the product. These capabilities include:

  • Impersonation and privilege mapping, which describes the mechanisms to enable a user to assume an effective user identity and a set of user permissions on remote servers.
  • Authorization, which discusses the process of granting a user access to resources or permissions to perform certain actions. BMC Server Automation supports authorization using a RBAC model and a set of very granular access control lists (ACLs).
  • Session layer security, which discusses how BMC Server Automation uses TLS for session layer security across all communications legs.
  • Authentication, which discusses how BMC Server Automation verifies the identity claimed by a system entity.

The capabilities you implement depend on your own security requirements and the BMC Server Automation system components that are communicating. For an explanation of how to implement all possible security capabilities, see Administering security.

Review the internationalization and localization information for the product The Language information section provides information about internationalization and localization for the product, such as:
  • International language sets, which identifies the international language sets BMC Server Automation is able to accept and display.
  • Language-enabled platforms, which lists the international platforms on which BMC Server Automation can run.
  • Localized languages, which lists the languages in which the BMC Server Automation interface is localized.
Was this page helpful? Yes No Submitting... Thank you

Comments