The functional usage model and BRMS security considerations
As a BRMS administrator, you understand the importance of protecting user and system data from deletion, distortion, and theft. The BRMS functional usage model allows you to customize user access to BRMS functions (backup, recovery, and media management) and to the different components of each function. For example, you can give one user authority to change a control group, and another the authority only to use and view it. You can also use the functional usage model to grant all users access to a particular function or functional component.
You need to access the BRMS functional usage model
through the IBM® Navigator
for i interface.
You can find instructions on how to use IBM Navigator
for i with the functional
usage model later in this chapter. If you do not have IBM Navigator
for i installed on
your system, you can find some tips on how to secure your BRMS functions
in Working with IBM i security controls.
BRMS also provides another security option, the SETUSRBRM command,
that allows you to reset a user or group profile by job category,
*OPERATOR or *ADMINISTRATOR. Use the Set User Usage for BRM (SETUSRBRM)
command as a starting point for controlling access to BRMS functions,
and use the IBM Navigator
for i interface
to tailor your security setup to better meet your requirements. You
do not need to have IBM Navigator
for i installed
to use this command.