Administering security


In TrueSight Server Automation, approaches to security vary, depending on which system components are communicating. The following graphic illustrates possible communication legs within a TrueSight Server Automation system.

adminTiers.png

See Security-for-different-communication-legs for a discussion of the security approaches that are possible with each leg and references to any implementation procedures required.

For a general description of the approaches to security that are possible with TrueSight Server Automation, including basic security concepts, see Security-planning.

If you are implementing the integration with change management, see Integrating-TrueSight-Server-Automation-and-Change-Management.

The following topics provide more information about administering security:

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*