Securing the solution

Security is important in IBM® Intelligent Operations Center because the solution is central to essential operations. To ensure security, it is important that you are aware of the default settings and that you manage users of the solution to give all users the correct level of access.

Default passwords

Your first task in securing the solution is to ensure that all default passwords are changed. A basic user registry is deployed with IBM Intelligent Operations Center that defines sample users and groups. The password for default and sample users is configured in the ioc.sample.users.pwd property that is in the installation properties file at /ioc_install/cfg/ioc.install.properties.
Note: Do not use an exclamation mark (!) as your first password character, and do not use the hash character (#) as the first character for any password in the installation properties file.

Secure connection

IBM Intelligent Operations Center is HTTPS enabled by default. Any change to the HTTPS setting for an individual service must be accompanied by an update to the corresponding port setting.

User authentication

User authentication is associated with authorization rights that give the user access to the appropriate features. IBM Intelligent Operations Center supports integration to the existing security infrastructure for single sign-on.

Configure user permissions in an external Lightweight Directory Access Protocol (LDAP) registry by using your chosen tools and processes. Then, configure IBM Intelligent Operations Center to use your LDAP registry.

Consider that accommodating many user groups, roles, and permissions can lead to a security regime that is difficult to manage. It is recommended that administrators restrict the number of groups and permissions.

User roles and permissions

Membership of a role-based user group provides a way of controlling access to the IBM Intelligent Operations Center. The users in a group have access only to the features of the solution that correspond to their role. Being a member of a role-based user group also helps users to focus on the appropriate tasks. The standard roles that you might want to configure are system administrators, solution administrators, and operators.

Use the following guidelines when you add a user to IBM Intelligent Operations Center:
  1. Choose a group that is appropriate to the role of the user in the organization, and make the user a member of that group.
  2. Complete a profile for the user and include at least the user ID, name, and password.

Page and taskbar access

An administrator can determine which groups and users can access each view and each feature in the IBM Intelligent Operations Center user interface.

Data sources and permissions

Access to a feature in IBM Intelligent Operations Center does not mean that a user can view all the data sources that it contains. To ensure that users see only the appropriate data, an administrator determines access during the configuration of individual data sources. An administrator can assign access to a data source to both user groups, and to individual users.