Maintenance outage for upgrade on Sunday, September 22

This site, docs.bmc.com, will be inaccessible for two hours starting at 8 AM CDT, Sunday, September 22, for a platform upgrade.

    Page tree
    Skip to end of metadata
    Go to start of metadata

    The use case in this section demonstrates how configuration item (CI) based access control allows you to:

    • Maintain access and permissions separately, thus leading to better management of resources
    • Leverage the separation above to achieve the required level of control

    Requirement

    Joe is an operator who has access to both Microsoft Windows and UNIX servers. The administrator wants Joe to be able to monitor and observe events generated from both these servers but wants to allow setting of thresholds only on monitors associated with UNIX servers.

    Solution

    The administrator can achieve this control by performing the following steps. For detailed information about procedures mentioned in these steps, see Managing users.

    1. Create two access control user groups: Windows servers and UNIX servers.
    2. Identify the CIs of the Windows server and add Windows Servers in the Read Security Access Control List (ACL) of these CIs.
    3. Identify the CIs of the UNIX server and add UNIX Servers in the Write Security ACL of these CIs.
    4. Create a user group called Threshold Management Operator. Create a role that contains permissions to set thresholds and associate this role with the Threshold Management Operator user group.
    5. Create a user group called Event Operator. Create a role that contains permissions to close events and associate this role with the Event Operator user group.

    The figure below illustrates these settings.