Unsupported content This version of the documentation is no longer supported. However, the documentation is available for your convenience. You will not be able to leave comments.

Administering security


In BMC Server Automation, approaches to security vary, depending on which system components are communicating. The following graphic illustrates possible communication legs within a BMC Server Automation system.

adminTiers.png

See Security for different communication legs for a discussion of the security approaches that are possible with each leg and references to any implementation procedures required.

For a general description of the approaches to security that are possible with BMC Server Automation, including basic security concepts, see Security.

The following topics provide more information about administering security:

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*