In TrueSight Server Automation, approaches to security vary, depending on which system components are communicating. The following graphic illustrates possible communication legs within a TrueSight Server Automation system.
See Security for different communication legs for a discussion of the security approaches that are possible with each leg and references to any implementation procedures required.
For a general description of the approaches to security that are possible with TrueSight Server Automation, including basic security concepts, see Security planning.
If you are implementing the integration with change management, see Integrating TrueSight Server Automation and Change Management.
The following topics provide more information about administering security:
- System capabilities related to security
- Managing access
- Generating a user information file
- Using the blcred utility
- Using certificates to secure communication between clients and Application Servers
- Encrypting your database connection
- Implementing single sign-on
- Configuring use of TLS version 1.2
- Implementing security for communication legs
- Implementing authentication
- How to deny NSH access
- Enabling third-party Certification Authority certificates to work with Yellowfin