About the security model for Veritas Operations Manager 5.0

Article:HOWTO77783  |  Created: 2012-08-24  |  Updated: 2012-08-24  |  Article URL http://www.symantec.com/docs/HOWTO77783
Article Type
How To

Product(s)

Subject


About the security model for Veritas Operations Manager 5.0

The security model specifies and enforces security policies. In Veritas Operations Manager, the security model is based on the mapping between security groups and roles.

The security model uses the following entities:

  • Security group

  • Role

  • Authentication domain

Veritas Operations Manager lets you combine a role and a scope to specify a predefined role. The following table explains the combination of roles and scopes and the resultant predefined roles:

Role and scope

Predefined role

Admin and Domain (All Business Entities)

Domain Admin

Admin and Selected Business Entities

Admin

Operator and Domain (All Business Entities)

Domain Operator

Operator and Selected Business Entities

Operator

None

Guest

When a user logs in, Veritas Operations Manager uses an authentication broker to authenticate the user across an authentication domain. If the user is authenticated, Veritas Operations Manager uses the authentication domain name and domain type to determine the security group that can be associated with the user. The security group is mapped to a predefined role.

See About predefined roles in Veritas Operations Manager 5.0

See Viewing security group details in Veritas Operations Manager 5.0


Legacy ID



v32582321_v71172234


Article URL http://www.symantec.com/docs/HOWTO77783


Terms of use for this information are found in Legal Notices