The functional usage model and BRMS security considerations

As a BRMS administrator, you understand the importance of protecting user and system data from deletion, distortion, and theft. The BRMS functional usage model allows you to customize user access to BRMS functions (backup, recovery, and media management) and to the different components of each function. For example, you can give one user authority to change a control group, and another the authority only to use and view it. You can also use the functional usage model to grant all users access to a particular function or functional component.

To learn about how to secure your BRMS functions, consult Working with IBM i security controls.

BRMS provides another security option, the SETUSRBRM command, that allows you to reset a user or group profile by job category, *OPERATOR or *ADMINISTRATOR. Use the Set User Usage for BRM (SETUSRBRM) command as a starting point for controlling access to BRMS functions.

Start of changeBRMS provides effective control over user access to BRMS functionality. IBM i security options prevent users from causing accidental or intentional damage to your files or system. In addition, because BRMS ships its databases with a default *PUBLIC *EXCLUDE authority, irreparable damage is unlikely to occur. End of change

Note: If you have the Advanced Functions feature installed, you can apply the functional usage model to the archive, retrieve, and migration components. For information about how to do so, see the Hierarchical Storage Management book for more information.