Only users with the role of Administrator can configure and maintain user accounts, policies, and other application objects accessible from the Administration tab, User and Access Management subtab. To log on to CA Enterprise Log Manager, users must have a user account configured with a role and credentials for logging in. Predefined roles and policies enable Administrators to set up user access by defining user accounts. Creating custom roles and policies is optional.
Administrator tasks involving users and access include the following:
When you add a new user, you create a global user. Details such as name, location, and telephone number are considered global because they can be shared. A global user is the user account information that excludes application-specific details.
Global user details are stored in the configured user store, which can be an external directory.
Application details are always stored in the repository of the management server. They are the details loaded in read-only format when you configure an external user store.
Creating user roles begins with defining a new application user group and then creating a policy defining the actions are permitted on specified resources. A user role can be a predefined application user group or a user-defined application group. Custom user roles are needed when the predefined application groups (Administrator, Analyst, and Auditor) are not sufficiently fine-grained to reflect work assignments. Custom user roles require custom access policies and modification of predefined policies to include the new role.
The CALM Application Access policy is an access control list type of scoping policy that defines who can access the CA Enterprise Log Manager. By default, the [Group] Administrator, [Group] Analyst and [Group] Auditor are granted access.
An access policy is a rule that grants or denies an identity (user or user group) access rights to an application resource.
An access filter is a filter that the Administrator can set to control what event data non-Administrator users or groups can view. For example, an access filter can restrict the data specified identities can view in a report. Access filters are automatically converted into obligation policies.
Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |