Securing the solution
Security is important in IBM® Intelligent Operations Center because the solution is central to essential operations. To ensure security, it is important that you are aware of the default settings and that you manage users of the solution to give all users the correct level of access.
Default passwords
Secure connection
IBM Intelligent Operations Center is HTTPS enabled by default. Any change to the HTTPS setting for an individual service must be accompanied by an update to the corresponding port setting.
User authentication
User authentication is associated with authorization rights that give the user access to the appropriate features. IBM Intelligent Operations Center supports integration to the existing security infrastructure for single sign-on.
Configure user permissions in an external Lightweight Directory Access Protocol (LDAP) registry by using your chosen tools and processes. Then, configure IBM Intelligent Operations Center to use your LDAP registry.
Consider that accommodating many user groups, roles, and permissions can lead to a security regime that is difficult to manage. It is recommended that administrators restrict the number of groups and permissions.
User roles and permissions
Membership of a role-based user group provides a way of controlling access to the IBM Intelligent Operations Center. The users in a group have access only to the features of the solution that correspond to their role. Being a member of a role-based user group also helps users to focus on the appropriate tasks. The standard roles that you might want to configure are system administrators, solution administrators, and operators.
- Choose a group that is appropriate to the role of the user in the organization, and make the user a member of that group.
- Complete a profile for the user and include at least the user ID, name, and password.
- SystemAdmins
- SolutionAdmins
- Operators
For IBM Intelligent Operations Center to operate correctly, at least one user must be assigned to each of the default groups. It is recommended that you retain the default administrative users. If you add groups or you define a new administrative user, you must configure the appropriate system properties. For more information, see the User roles and access topic.
Page and taskbar access
An administrator can determine which groups and users can access each view and each feature in the IBM Intelligent Operations Center user interface.
Data sources and permissions
Access to a feature in IBM Intelligent Operations Center does not mean that a user can view all the data sources that it contains. To ensure that users see only the appropriate data, an administrator determines access during the configuration of individual data sources. An administrator can assign access to a data source to both user groups, and to individual users.