Page tree
Skip to end of metadata
Go to start of metadata

In BMC Server Automation, approaches to security vary, depending on which system components are communicating. The following graphic illustrates possible communication legs within a BMC Server Automation system.



See Security for different communication legs for a discussion of the security approaches that are possible with each leg and references to any implementation procedures required.

For a general description of the approaches to security that are possible with BMC Server Automation, including basic security concepts, see Security planning.

If you are implementing the integration with change management, see Enabling HTTPS support for the BMC Atrium Orchestrator connection.

The following topics provide more information about administering security: