Defining security settings
As an administrator, you can use Security settings in CES to secure access to BMC AMI Products for Web, product functions, administrative functions, and REST endpoints. With security enabled, users must provide credentials to access the BMC AMI Products for Web. By default, administrative functions are restricted and users have access only to the base web product functions. Restricted functions are not displayed in the user interface and REST endpoints are inaccessible.
The Security feature consists of the following tabs:
- Personal access tokens
- Security
- Users
- Groups
- Roles
Configuring personal access tokens
Personal access tokens are a widespread standard used across well-known organizations and services. You use personal access tokens instead of your credentials when you perform Code Pipeline operations by using the Code Pipeline API.
In the Personal access token tab, you can view a list of configured personal access tokens with their user names, generated token, host, and port.
You can perform the following actions on the Personal access token tab:
Purpose | Action |
---|---|
Add a personal access token | Click Add and complete the fields in the Add personal access token dialog box. For more information, see Adding a personal access token. |
Edit a personal access token | Select the row and click |
View the personal access token generated and used when making API requests. | Click |
Copy the personal access token | In the relevant row, click This icon is displayed for a personal access token only after authentication. |
Remove a personal access token | In the relevant row, click |
Remove multiple personal access tokens | Select the check boxes in the relevant rows and click Delete. |
Search within the details in the table | In the Search field, specify your search criteria. |
Filter the details at the column level | In the Field field, specify your filter criteria. |
Adding a personal access token
Perform the following steps to configure a personal access token:
- On the Personal access token tab, click Add.
- In the Add personal access token dialog box, select the required Host connection, which is the z/OS host system name or IP address that is running. To create a secure host connection, make sure that the port used is already defined as a secure port on the host mainframe.
- In Username, enter the RACF login name to associate with the token.
- Enter the required Password.
- Click Save.
Related topics