The following table describes the process for planning the implementation or deployment of the product, and provides links to the applicable topics:  

Planning task

Benefit

Plan the deployment

Familiarize yourself with the TrueSight-Server-Automation-architecture.

If you are implementing provisioning with TrueSight Server Automation, review the Implementation-process-for-provisioning and Planning-for-provisioning topics.

If you are implementing patch management with TrueSight Server Automation, review the Implementation-process-for-patch-management and Planning-for-patch-management topics.

If you are implementing compliance content, review the Implementation-process-for-compliance-content-analysis.

Review the topics in the Deployment-use-cases section to:

Plan for scaling the environment

Review the Sizing-and-scalability-considerations topic to review guidelines for sizing and scaling a TrueSight Server Automation Application Server. Note that the settings for some configuration parameters related to size and scale can affect Application Server performance.

Tip: For the latest sizing and scalability recommendations refer to the TrueSight Server Automation Sizing Guide in the BMC Communities. 

Review system requirements

Review information about permissions and authorizations

The Permissions section provides information about:

Plan for security

The Security-planning  section provides overview information about the security capabilities of the product. These capabilities include:

  • Impersonation-and-privilege-mapping, which describes the mechanisms to enable a user to assume an effective user identity and a set of user permissions on remote servers.
  • Authorization, which discusses the process of granting a user access to resources or permissions to perform certain actions. TrueSight Server Automation supports authorization using a RBAC model and a set of very granular access control lists (ACLs).
  • Session-layer-security, which discusses how TrueSight Server Automation uses TLS for session layer security across all communications legs.
  • Authentication, which discusses how TrueSight Server Automation verifies the identity claimed by a system entity.

The capabilities you implement depend on your own security requirements and the TrueSight Server Automation system components that are communicating. For an explanation of how to implement all possible security capabilities, see Administering-security.

Review the internationalization and localization information for the product

The Language-information section provides information about internationalization and localization for the product, such as:

  • International language sets, which identifies the international language sets TrueSight Server Automation is able to accept and display.
  • Language-enabled platforms, which lists the international platforms on which TrueSight Server Automation can run.
  • Localized languages, which lists the languages in which the TrueSight Server Automation interface is localized.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*