The functional usage model and BRMS security considerations
As a BRMS administrator, you understand the importance of protecting user and system data from deletion, distortion, and theft. The BRMS functional usage model allows you to customize user access to BRMS functions (backup, recovery, and media management) and to the different components of each function. For example, you can give one user authority to change a control group, and another the authority only to use and view it. You can also use the functional usage model to grant all users access to a particular function or functional component.
You need to access the BRMS functional usage model through the IBM® Navigator for i interface. You can find instructions on how to use IBM Navigator for i with the functional usage model later in this chapter. If you do not have IBM Navigator for i installed on your system, you can find some tips on how to secure your BRMS functions in Working with IBM i security controls.
BRMS also provides another security option, the SETUSRBRM command, that allows you to reset a user or group profile by job category, *OPERATOR or *ADMINISTRATOR. Use the Set User Usage for BRM (SETUSRBRM) command as a starting point for controlling access to BRMS functions, and use the IBM Navigator for i interface to tailor your security setup to better meet your requirements. You do not need to have IBM Navigator for i installed to use this command.