Only nsmadmin and the install user (usually Administrator) can run Discovery after CA NSM is installed. You may want to give other users authority to run Discovery without giving them administrator privileges.
To create a user without administrator privileges, follow these steps:
Note: For more information about the modp command, see the online CA Reference.
The topics that follow explain WorldView security considerations.
You can set up read-only users for the WorldView tables in the MDB. A read-only user is not permitted to perform any operations in Unicenter MCC or the WorldView Classic GUI that may update the WorldView MDB data.
Note: Using this procedure to apply read-only access affects only WorldView data in the MDB. It does not affect DSM, Enterprise Management, or other data providers.
To set up read-only Windows-authenticated users
Note: Use the Local Security Policy GUI to set up the operating systems rights.
Important! Do not add these Windows users to the TNDUsers group.
The user has read-only permission for WorldView data.
You can set up read-only users for the WorldView tables in the MDB. A read-only user is not permitted to perform any operations in Unicenter MCC or the WorldView Classic GUI that may update the WorldView MDB data.
Note: Using this procedure to apply read-only access affects only WorldView data in the MDB. It does not affect DSM, Enterprise Management, or other data providers.
To set up read-only Microsoft SQL Server users
The user has read-only permission for WorldView data.
You can set up read-only users in Ingres for the WorldView tables in the MDB when Data Scoping is not active. A read-only user is not permitted to perform any operations in the Management Command Center and the WorldView Classic GUI that may update the WorldView MDB data.
Note: Using this procedure to apply read-only access affects only WorldView data in the MDB. It does not apply the same access to DSM, Enterprise Management, or other data providers.
To set up read-only users for WorldView
Note: On UNIX/Linux, you can use the add_ingres_user script in the $CAIGLBL0000/wv/script directory to do this automatically.
The user has read-only permission for WorldView data.
Note: Do not use the database security permissions of a particular user for implementing read-only users when Data Scoping is active.
To connect remotely to another MDB using WorldView Classic, you must connect to a logical repository. If a logical repository does not exist, you must first define one. See Define a Logical Repository.
To connect remotely to another MDB
The Select Repository dialog appears.
Note: If the name does not appear in the drop-down, click Find and select the name, or type the name of the logical repository.
You are connected to the logical repository, and the WorldView Classic GUI component opens.
Note: When you start the 2D Map using the catng2d command, use the /R parameter to specify the logical repository. Do not use the /U and /P parameters for Ingres connections if you are using an Ingres database.
You may be responsible for managing multiple installations of CA NSM and may need to connect to a remote MDB to run CA NSM applications that update the remote MDB.
To connect to a remote repository
Note: When creating the logical repository you must know the Administrator account for the remote server that was defined, in addition to the password.
modp -r repository_name -u userid -n password
Example: Connect to a Remote Repository
Unixp is a CA NSM client computer, and uswv01 is the name of the WorldView server where the MDB resides. On unixp, define a logical repository named uswv01a to associate with the MDB on uswv01 using the nsmadmin user ID and password for uswv01. If unixp contains CA NSM management components, run modp to define the nsmadmin user ID and password for uswv01. You can now connect to uswv01a and run WorldView and Discovery applications (Discovery is a management component) from unixp and the data is stored in the MDB on uswv01.
Before you can connect remotely to an MDB, you must define a logical repository.
To define a logical repository
The CA NSM Repository Creation wizard appears.
Note: You can also run the iirepdef command or click Define on the Select Repository dialog to start the CA NSM Repository Creation wizard.
The Access Type page appears.
The Server Name page appears.
Specifies the name of the MDB server, which must already exist.
Specifies the name of the CA NSM user ID for access to the MDB.
Specifies the password for the Server User.
Specifies the name of the Ingres Installation ID used when the MDB was installed. The default is EI.
Specifies the name of the Microsoft SQL Server instance used when the MDB was installed.
You are connected to the MDB, and the logical repository is defined.
Note: If the connection to the MDB fails, you receive an error and the wizard reappears. Typically, this signifies that you do not have the proper credentials to connect to the MDB. For the proper credentials, see your CA NSM administrator.
Before you can connect remotely to an MDB, you must define a logical repository.
To define a logical repository, run the iirepdef command. For more information about the iirepdef command, see the online CA Reference.
The topics that follow explain Management Command Center security.
In a typical installation of CA NSM, the Management Command Center is run remotely from a client computer. Since the MCC is accessing information about Unicenter Manager servers, you must supply a user ID and password for that type of manager before you can access any of the network information using the Management Command Center. The following is a list of things to consider when assigning user IDs to access Management Command Center:
The TNDUsers group is added automatically to your Windows computer when you install CA NSM (specifically, the WorldView Manager component) on the MDB server. If you use a Windows user ID in the login security dialog to log on to the Management Command Center, that Windows user ID must be a member of the TNDUsers group on the computer that contains the MDB. You can use the Windows User Manager to add this user ID to the Windows Group TNDUsers.
You must enter the domain account in the form “Domain1\User1” in the Management Command Center login security dialog, regardless of where Management Command Center is running. The domain of the computer where the MDB resides must be the same domain or trust the domain of the domain account used for authentication. For example, if you enter "Domain1\User1" in the Management Command Center login security dialog, the computer that contains the MDB must be logged into Domain1, or DomainX, where DomainX trusts Domain1. If you enter the account in the form “User1,” then it is considered a local user account defined to the computer where Management Command Center is running. The domain user must be a member of the TNDUsers group, either directly or indirectly through a domain group.
For example, if a user logged into the client computer as DomainA\joe, the user is authenticated to Ingres as joe, not DomainA\joe because Ingres does not support domain accounts.
This account can be defined to an Ingres server using the accessdb utility. This operating system ID must also have access to the MDB. You can do this on the server where the Ingres database resides.
Each Ingres user must be defined to a default user group. For WorldView access that has full authorization, assign the default group of wvadmin (or uniadmin for all CA NSM tables). For users that should only have only read authorization, assign the default group of wvuser (or uniuser for all product tables).
This account can be defined to SQL Server using the SQL Enterprise Manager utility. This user ID must also have access to the MDB. You can do this on the server where the SQL Server database resides.
Each SQL Server user must be defined to a default user role. For WorldView access that has full authorization, assign the default role of wvadmin (or uniadmin for all CA NSM tables). For users that should only have only read authorization, assign the default role of wvuser (or uniuser for all product tables).
| Copyright © 2010 CA. All rights reserved. |
|