In TrueSight Server Automation, approaches to security vary, depending on which system components are communicating. The following graphic illustrates possible communication legs within a TrueSight Server Automation system.
See Security for different communication legs for a discussion of the security approaches that are possible with each leg and references to any implementation procedures required.
For a general description of the approaches to security that are possible with TrueSight Server Automation, including basic security concepts, see Security planning.
If you are implementing the integration with change management, see Integrating TrueSight Server Automation and Change Management.
The following topics provide more information about administering security:
- System capabilities related to security
- Managing access
- Generating a user information file
- Using the blcred utility
- Implementing private certificates in TrueSight Server Automation
- Encrypting your database connection
- Implementing single sign-on
- Configuring the TLS protocol
- Implementing security for communication legs
- Implementing authentication
- How to deny NSH access
- Smart Hub authentication