Securing the solution

Security is important in IBM® Intelligent Operations Center because the solution is central to essential operations. To ensure security, it is important that you are aware of the default settings and that you manage users of the solution to give all users the correct level of access.

Default passwords

Your first task in securing the solution is to ensure that all default passwords are changed. A basic user registry is deployed with IBM Intelligent Operations Center that defines sample users and groups. The password for default and sample users is configured in the ioc.sample.users.pwd property that is in the installation properties file at /ioc_install/cfg/ioc.install.properties.
Note: Do not use an exclamation mark (!) as your first password character, and do not use the hash character (#) as the first character for any password in the installation properties file.

Secure connection

IBM Intelligent Operations Center is HTTPS enabled by default. Any change to the HTTPS setting for an individual service must be accompanied by an update to the corresponding port setting.

User authentication

User authentication is associated with authorization rights that give the user access to the appropriate features. IBM Intelligent Operations Center supports integration to the existing security infrastructure for single sign-on.

Configure user permissions in an external Lightweight Directory Access Protocol (LDAP) registry by using your chosen tools and processes. Then, configure IBM Intelligent Operations Center to use your LDAP registry.

Consider that accommodating many user groups, roles, and permissions can lead to a security regime that is difficult to manage. It is recommended that administrators restrict the number of groups and permissions.

User roles and permissions

Membership of a role-based user group provides a way of controlling access to the IBM Intelligent Operations Center. The users in a group have access only to the features of the solution that correspond to their role. Being a member of a role-based user group also helps users to focus on the appropriate tasks. The standard roles that you might want to configure are system administrators, solution administrators, and operators.

Use the following guidelines when you add a user to IBM Intelligent Operations Center:
  1. Choose a group that is appropriate to the role of the user in the organization, and make the user a member of that group.
  2. Complete a profile for the user and include at least the user ID, name, and password.
The deployment assigns default users to each of the following default groups that are configured in the GroupList system property.
  • SystemAdmins
  • SolutionAdmins
  • Operators

For IBM Intelligent Operations Center to operate correctly, at least one user must be assigned to each of the default groups. It is recommended that you retain the default administrative users. If you add groups or you define a new administrative user, you must configure the appropriate system properties. For more information, see the User roles and access topic.

Page and taskbar access

An administrator can determine which groups and users can access each view and each feature in the IBM Intelligent Operations Center user interface.

Data sources and permissions

Access to a feature in IBM Intelligent Operations Center does not mean that a user can view all the data sources that it contains. To ensure that users see only the appropriate data, an administrator determines access during the configuration of individual data sources. An administrator can assign access to a data source to both user groups, and to individual users.