Previous Topic: Configuring the Event Traffic Controller

Next Topic: Accessing a Remote Host


Configuring Security for the Event Traffic Controller

You can use the following remote viewing security measure with the Event Traffic Controller. If a list of trusted host names is specified, the Event Traffic Controller restricts SESSCMD requests to only those user names from the hosts specified in this file.

You must stop and restart CA Automation Point for Event Traffic Controller security to reflect any security-related changes that have been made to CA AP Remote Manager options.

See the chapter "Viewing Remote Sessions" for details about setting up security for remote viewing.