Defining user access

As part of the planning process, you make decisions about user access to IBM® Sterling Control Center Monitor and the data it collects.

Consider the following when determining user access:

  • The types of users (roles) who can access IBM Sterling Control Center Monitor
  • The permissions those roles have when configuring and managing the servers IBM Sterling Control Center Monitor monitors (manage, view only, or none)
  • Whether you plan to limit what events (data) specific users can monitor
  • Whether you implement a password policy that governs password creation

As you are planning your IBM Sterling Control Center Monitor implementation, define the user roles you need in your environment and then configure those roles. When you add users, you can assign them the roles you define. When you create objects such as calendars, rules, and SLCs, you can specify the roles allowed to modify those objects.