Question & Answer
Question
What are the difference between Authentication and Authorization Roles in IBM Log Analysis?
[{"Type":"MASTER","Line of Business":{"code":"LOB77","label":"Automation Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSPFMY","label":"IBM Operations Analytics - Log Analysis"},"ARM Category":[{"code":"a8m50000000CcKgAAK","label":"Log Analysis-\u003EFramework-\u003EConfigurations-\u003EUser permissions\/roles"}],"ARM Case Number":"TS006187692","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Versions"}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Product Synonym
LA
Was this topic helpful?
Document Information
Modified date:
16 July 2021
UID
ibm16473099