An authorization policy either grants or excludes permission to a user or user group, acting in one of more roles, to perform an operation on an type of object, for a resource which is scoped by its resource type.
| User | Who initiates the operation. |
| User group | A set of users who can initiate the operation. |
| Role | A collection of permissions that can be assigned to users or user groups. |
| Operation | An action such as create, delete, modify, distribute, or view. |
| Object type | A categorization of the object that the operation is performed on. For example, monitoring data (attributegroup), event, or role. |
| Resource | The entity that the operation is being performed against such as a specific managed system group or managed system. |
| Resource type | A categorization of the resource. Managed system groups (managedsystemgroup), managed systems (managedsystem), and sets of roles (rolegroup) are the predefined resource types. |
These can be the same managed system groups that you also use to distribute situations and historical collections.
For example, you can define a role called Eastern region Windows administrators to control the monitored resources that can be accessed by the Windows OS administrators at your eastern region data center.
For example, you can grant permission to view monitoring data for the managed system group EasternRegionWindowsComputers where the operation is view, the object type is attributegroup (which represents monitoring data), the resource is EasternRegionWindowsComputers, and the resource type is managedsystemgroup.
You can also revoke permissions from a role if you later decide that you need to remove a grant or exclude permission from a role. Authorization policies are also used to control which users can create and work with roles.
| Permission | Operation | Object type | Resource type | Description |
|---|---|---|---|---|
| grant | view | attributegroup | managedsystemgroup | Using this combination, you can grant permission to view monitoring data such as metrics or status for all managed systems in a managed system group. |
| grant | view | event | managedsystemgroup | Using this combination, you can grant permission
to view situation events from all managed systems in a managed system
group. Note: If you want to grant permission
to view the monitoring data that triggered the situation event then
you must grant permission to view monitoring data for the managed
system group.
|
| grant | view | attributegroup | managesystem | Using this combination, you can grant permission to view monitoring data such as metrics or status for a specific managed system. |
| grant | view | event | managedsystem | Using this combination, you can grant permission
to view situation events from a specific managed system. Note: If you want to grant permission
to view the monitoring data that triggered the situation event then
you must grant permission to view monitoring data for the managed
system group.
|
| exclude | managedsystem | Using this combination, you can exclude permission to perform any operation for a specific managed system. | ||
| grant | create | role | rolegroup | Using this combination, you can grant permission to create roles or events for specific managed systems. |
| grant | delete | role | rolegroup | Using this combination, you can grant permission to delete roles. |
| grant | distribute | role | rolegroup | Using this combination, you can grant permission to distribute policies from the Authorization Policy Server to the Tivoli Enterprise Portal Server. |
| grant | modify | role | rolegroup | Using this combination, you can grant permission to modify roles. |
| grant | view | role | rolegroup | Using this combination, you can grant permission to view roles and permissions that you are assigned. This permission can be used if you have users who should be able to view their permissions but not permissions for other users. |
| grant | viewall | role | rolegroup | Using this combination, you can grant permission to view all roles and permissions. |
When you are granted permission to view attribute groups (monitoring data) or events for a managed system group, you are granted permission to view the group and you are also granted permission to view all of the group members, unless there is an exclude permission for a group member.
In a large deployment of IBM Tivoli Monitoring, you might have multiple monitoring domains. A monitoring domain is defined as a collection of IBM Tivoli Monitoring components such as portal servers, monitoring servers, monitoring agents, and a Tivoli Data Warehouse that are centered around a particular hub monitoring server. In this type of deployment, you might have some authorization policies that are common across your monitoring domains as well as authorization policies that are specific to a particular domain. When you create permissions, the tivcmd CLI allows you to specify if the authorization policy applies to all domains (the default behavior) or to specific domains.
A role group is a set of roles that are shared across all the IBM Tivoli Monitoring domains using a single Authorization Policy Server. The Authorization Policy Server supports only one role group named default. It is specified as the resource name when creating permissions that perform operations on roles.
For information about working with authorization policies in a multi-domain deployment, see Working with multiple domains.