Securing your environment
To provide a secure environment for IBM® Business Monitor, you must enable both administrative security and application security. Use the Security Configuration Wizard in the WebSphere® Application Server administrative console to enable or change security for IBM Business Monitor.
The security configuration of IBM Business Monitor must match the configuration of other servers that participate in the same single sign-on domain; for example, Business Space powered by WebSphere, WebSphere Portal, and Process Server.
IBM Business Monitor uses long security names (for example, LDAP DN) if security is enabled, and it uses a short name if security is disabled. Therefore, any configuration made under one setting will not be visible under the other. Use the WebSphere Portal configuration wizard to change security settings for WebSphere Portal.
- You can configure access to monitor models using Monitor Data Security in the administrative console.
- You can configure a more fine-grained form of access by filtering
the data that users and groups can view.
- You can limit which instances of a model context are available to the users and groups by setting up a security filter. The security filter is applied to all instance, KPI, and cube queries.
- You can limit access to specific monitor objects by setting up security rules. You can set up security rules to apply to metrics, dimensions, measures, KPIs, and alerts.
IBM Business Monitor supports LDAP configured under Federated Repositories, and now also supports a standalone LDAP configuration.
If you are not using WebSphere Portal, you can use a file-based repository. WebSphere Portal must be able to share a user registry with the IBM Business Monitor server, meaning that only LDAP server registry or custom user registry is supported.
Additionally, you must configure CEI security. You can use method-level declarative security to access CEI functions. Detailed information is provided in a related link below.
For more information about securing applications and the environment for WebSphere Application Server, see the Security section of the WebSphere Application Server Information Center. A related link is provided.
Detailed information on the configurations are provided in the following topics:
