Important

   

This space contains documentation for TrueSight Server Automation 8.9.03 and the later service packs for 8.9. For earlier releases, see BMC Server Automation 8.9.

Planning

The following table describes the process for planning the implementation or deployment of the product, and provides links to the applicable topics:  

Planning taskBenefit
Plan the deployment

Familiarize yourself with the TrueSight Server Automation architecture.

If you are implementing provisioning with TrueSight Server Automation, review the Implementation process for provisioning and Planning for provisioning topics.

If you are implementing patch management with TrueSight Server Automation, review the Implementation process for patch management and Planning for patch management topics.

If you are implementing compliance content, review the Implementation process for compliance content analysis.

Review the topics in the Deployment use cases section to:

Plan for scaling the environment

Review the Sizing and scalability considerations topic to review guidelines for sizing and scaling a TrueSight Server Automation Application Server. Note that the settings for some configuration parameters related to size and scale can affect Application Server performance.

Tip: For the latest sizing and scalability recommendations refer to the TrueSight Server Automation Sizing Guide in the BMC Communities. 

Review system requirements

The System requirements section provides information about:

Review information about permissions and authorizations

The Permissions section provides information about:

Plan for security

The Security planning  section provides overview information about the security capabilities of the product. These capabilities include:

  • Impersonation and privilege mapping, which describes the mechanisms to enable a user to assume an effective user identity and a set of user permissions on remote servers.
  • Authorization, which discusses the process of granting a user access to resources or permissions to perform certain actions. TrueSight Server Automation supports authorization using a RBAC model and a set of very granular access control lists (ACLs).
  • Session layer security, which discusses how TrueSight Server Automation uses TLS for session layer security across all communications legs.
  • Authentication, which discusses how TrueSight Server Automation verifies the identity claimed by a system entity.

The capabilities you implement depend on your own security requirements and the TrueSight Server Automation system components that are communicating. For an explanation of how to implement all possible security capabilities, see Administering security.

Review the internationalization and localization information for the productThe Language information section provides information about internationalization and localization for the product, such as:
  • International language sets, which identifies the international language sets TrueSight Server Automation is able to accept and display.
  • Language-enabled platforms, which lists the international platforms on which TrueSight Server Automation can run.
  • Localized languages, which lists the languages in which the TrueSight Server Automation interface is localized.
Was this page helpful? Yes No Submitting... Thank you

Comments