Important

   

This space contains documentation for TrueSight Server Automation 8.9.03 and the later service packs for 8.9. For earlier releases, see BMC Server Automation 8.9.

Administering security

In TrueSight Server Automation, approaches to security vary, depending on which system components are communicating. The following graphic illustrates possible communication legs within a TrueSight Server Automation system.



See Security for different communication legs for a discussion of the security approaches that are possible with each leg and references to any implementation procedures required.

For a general description of the approaches to security that are possible with TrueSight Server Automation, including basic security concepts, see Security planning.

If you are implementing the integration with change management, see Integrating TrueSight Server Automation and Change Management.

The following topics provide more information about administering security:

Was this page helpful? Yes No Submitting... Thank you

Comments