About the security model for Veritas Operations Manager 5.0

Description

About the security model for Veritas Operations Manager 5.0

The security model specifies and enforces security policies. In Veritas Operations Manager, the security model is based on the mapping between security groups and roles.

The security model uses the following entities:

  • Security group

  • Role

  • Authentication domain

Veritas Operations Manager lets you combine a role and a scope to specify a predefined role. The following table explains the combination of roles and scopes and the resultant predefined roles:

Role and scope

Predefined role

Admin and Domain (All Business Entities)

Domain Admin

Admin and Selected Business Entities

Admin

Operator and Domain (All Business Entities)

Domain Operator

Operator and Selected Business Entities

Operator

None

Guest

When a user logs in, Veritas Operations Manager uses an authentication broker to authenticate the user across an authentication domain. If the user is authenticated, Veritas Operations Manager uses the authentication domain name and domain type to determine the security group that can be associated with the user. The security group is mapped to a predefined role.

See About predefined roles in Veritas Operations Manager 5.0

See Viewing security group details in Veritas Operations Manager 5.0

Terms of use for this information are found in Legal Notices.

Search

Survey

Did this article answer your question or resolve your issue?

No
Yes

Did this article save you the trouble of contacting technical support?

No
Yes

How can we make this article more helpful?

Email Address (Optional)