About the security model for Veritas Operations Manager 5.0
|Article:HOWTO77783|||||Created: 2012-08-24|||||Updated: 2012-08-24|||||Article URL http://www.symantec.com/docs/HOWTO77783|
The security model specifies and enforces security policies. In Veritas Operations Manager, the security model is based on the mapping between security groups and roles.
Veritas Operations Manager lets you combine a role and a scope to specify a predefined role. The following table explains the combination of roles and scopes and the resultant predefined roles:
Role and scope
Admin and Domain (All Business Entities)
Admin and Selected Business Entities
Operator and Domain (All Business Entities)
Operator and Selected Business Entities
When a user logs in, Veritas Operations Manager uses an authentication broker to authenticate the user across an authentication domain. If the user is authenticated, Veritas Operations Manager uses the authentication domain name and domain type to determine the security group that can be associated with the user. The security group is mapped to a predefined role.
Article URL http://www.symantec.com/docs/HOWTO77783