Information

This site will undergo a brief period of maintenance on Friday, 5 December at 12:30 AM Central/12:00 PM IST. During a 30 minute window, site availability may be intermittent.

Administering security


In TrueSight Server Automation, approaches to security vary, depending on which system components are communicating. The following graphic illustrates possible communication legs within a TrueSight Server Automation system.

adminTiers.png

See Security-for-different-communication-legs for a discussion of the security approaches that are possible with each leg and references to any implementation procedures required.

For a general description of the approaches to security that are possible with TrueSight Server Automation, including basic security concepts, see Security-planning.

If you are implementing the integration with change management, see Integrating-TrueSight-Server-Automation-and-Change-Management.

The following topics provide more information about administering security:

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

TrueSight Server Automation 25.2