Default language.

User goals and features


BMC provides a large set of task-based, conceptual, and reference information about  features for new and current users to help you be successful with your  platform implementation. Each section contains a home page with goal-based topic summaries and links to instructions.

The following video (03:40) gives an overview of how different roles interact with :

icon_play.pnghttps://youtu.be/LjEIoEea7Jg


Administrator responsibilities

Typically,  administrators are responsible for some or all of these tasks:

  • Installing  software
  • Defining their organization's work processes and business rules
  • Determining how to allocate server and database resources
  • Managing  access control by assigning permissions for  applications and their components
  • Maintaining  by adding and deleting users, groups, and roles; backing up ; importing data from other systems

Application programmer responsibilities

Typically,  programmers are responsible for some or all of these tasks:

  • Writing plug-ins and custom clients that use the  C API, Java API, or Java plug-in API
  • Integrating external applications with 

Developer responsibilities

Typically,  developers are responsible for some or all of these tasks:

  • Creating a  application that reflects a set of work processes and business rules, or working with a consultant to create an application
  • Localizing a  application for use in other languages or countries
  • Modifying a  application to reflect changes in the organization's work processes

End user responsibilities

Typically,  end users are responsible for some or all of these tasks:

  • Using  software
  • Raising incident and service requests
  • Analysis or consumption of a customized or prepackaged Remedy application included in an  solution

Security administrator responsibilities

Typically,  security administrators are responsible for some or all of these tasks:

  • Securing  software
  • Managing user accounts
  • Setting permissions
  • Implementing security policy, standards, guidelines and procedures to ensure ongoing maintenance of security
  • Managing user accesses for single sign-on, which includes managing server configuration, authentication mechanisms, and multiple realms.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*