Managing user access


After a successful installation, you must grant access permission to some or all of the following BMC AMI Command Center features by creating System Authorization Facility (SAF) resources:

  • Perspectives
  • Product tools perspective views
  • Applications (Apps)

Anyone with BMC AMI Command Center access can use the Workspace manager and DB2 Navigator features.

Related topic

To set up the BMC AMI Command Center repository, you must grant BMC AMI Command Center superuser authorization to at least one user.

Before you begin

You must have SAF authorization that enables you to create and assign the required resources.

To grant user access

Use the following procedure to grant access permission to BMC AMI Command Center features. You must grant access for each UIM installation.

  1. To grant access permission to features, perform one of the following actions:

    • To grant access to all features, create the following SAF resource: BMCGUD.WBAC.system.port.**
    • To grant access by feature, create a SAF resource for each feature. For more information about the SAF resources associated with BMC AMI Command Center features, see SAF resources.

    When creating SAF resources, perform the following actions:

    • Create the SAF resources as an XFACILIT class. If you use CA-ACF2, define the resource as TYPE(XFC).
    • Replace the variable port with the port number of the UIM server.
    • Replace the variable system with the value of the SYSNAME system symbol, which you can obtain using the MVS system command D SYMBOLS.
  2. Grant ALTER authority to the resources that you created for the user or group that needs to access the features.

To revoke user access

You can revoke access permission to one or more BMC AMI Command Center features. You must revoke access for each UIM installation to which you granted access. You cannot revoke access to the Workspace manager or DB2 Navigator perspective unless you entirely revoke access to BMC AMI Command Center.

If you granted access to all features using the double asterisk syntax, perform one of the following actions for the user or group for which you want to revoke access:

  • To revoke access to all features, assign NONE authority to the WBAC.system.port.** SAF resource.
  • To revoke access to one or more features, perform the following steps:
    1. Create a SAF resource for each feature. For more information about the SAF resources associated with BMC AMI Command Center features, see SAF resources.
    2. Grant NONE authority to the resources that you created.

If you granted access to features by creating SAF resources for each feature, grant NONE authority to the resources that you created for the user or group for which you want to revoke access.

When creating SAF resources, perform the following actions:

  • Create the SAF resources as an XFACILIT class. If you use CA-ACF2, define the resources as TYPE(XFC).
  • Replace the variable port with the port number of the UIM server.
  • Replace the variable system with the value of the SYSNAME system symbol, which you can obtain using the MVS system command D SYMBOLS.

SAF resources

For the Workspace console, you can grant or revoke access permission for specific perspectives. The following table contains the SAF resources for each perspective:

For this perspective

Create this SAF resource

File Locator

BMCGUD.WBAC.system.port.FILE_LOCATOR

Job Browser

BMCGUD.WBAC.system.port.JOB_BROWSER

SQL Tuning

BMCGUD.WBAC.system.port.SQL_TUNING

Scratchpad

BMCGUD.WBAC.system.port.SCRATCHPAD

Schema Management

BMCGUD.WBAC.system.port.SCHEMA_MANAGEMENT

Recovery Management

BMCGUD.WBAC.system.port.RECOVERY_MANAGEMENT

Product Tools

BMCGUD.WBAC.system.port.PRODUCT_TOOLS

For the Product Tools perspective, you can grant or revoke access permission for specific features (views). The following table contains the SAF resources for the Product Tools views:

For this Product Tools view

Create this SAF resource

Object set management

BMCGUD.WBAC.system.port.PRODUCT_TOOLS.OBJ_SET_MGR

BMC AMI Utility Management

BMCGUD.WBAC.system.port.PRODUCT_TOOLS.NGT_UTIL_MGR

SmartSwitch

BMCGUD.WBAC.system.port.PRODUCT_TOOLS.SMART_SWITCH             

SQL Assurance

BMCGUD.WBAC.system.port.PRODUCT_TOOLS.SQL_ASSURANCE

Schema Standards

BMCGUD.WBAC.system.port.PRODUCT_TOOLS.SCHEMA_STANDARDS

For the Apps console, you can grant or revoke access permission for specific Apps. The following table contains the SAF resources for the Apps:

For this App

Create this SAF resource

SQL Errors

BMCGUD.WBAC.system.port.SQL_ERRORS

SQL Analysis

BMCGUD.WBAC.system.port.SQL_ANALYSIS

BMCGUD.WBAC.system.port.SQL_ALERTS

To grant superuser authorization

You must grant superuser authorization to at least one BMC AMI Command Center user. A superuser authorization is required to set up the BMC AMI Command Center repository.

With superuser authorization, a user can perform the following actions:

  • Set up the BMC AMI Command Center repository.
  • Edit and delete connections owned by any user.
  • Edit and delete templates owned by any user.
  • Create, edit, and delete public connections.
  • Create, edit, and delete product links.

Superuser authorization is specific to each UIM. If your site stores public connections and templates on several sysplexes according to business function, you can provide superuser authorization to specific users based on their areas of responsibility.

Important

If you previously used ACT.WBSU.host.port to define a superuser, you do not need to change it.

To grant superuser authorization, perform the following steps:

  1. Make sure that the UIM server PTF BPJ0835 has been installed. 
  2. For each UIM installation, create the following SAF resource: BMCGUD.WBSU.system.port
    When creating the SAF resource, perform the following actions:
    • Create the SAF resources as an XFACILIT class. If you use CA-ACF2, define the resources as TYPE(XFC).
    • Replace the variable port with the port number of the UIM server.
    • Replace the variable system with the value of the SYSNAME system symbol, which you can obtain using the MVS system command D SYMBOLS.
  3. Grant ALTER authority to the superuser resource for the user requiring superuser authorization on the specified UIM.

To hide disabled features

(BMC.DB2.SPE2301)

Use the following procedure to hide features that users are not authorized to use:

  1. In the console's main menu, click Signed in as > User Access.
  2. In the User Access dialog box, select the Manage user access tab.
  3. Select Hide features disabled by the security administrator.
  4. Click OK.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*