Introducing Tivoli Kernel Services Administration

Size: px
Start display at page:

Download "Introducing Tivoli Kernel Services Administration"

Transcription

1 Introducing Tivoli Kernel Services Administration Version 1.2

2

3 Introducing Tivoli Kernel Services Administration Version 1.2

4 Introducing Tivoli Kernel Services Administration Copyright Notice Copyright IBM Corporation 2000, 2001 All rights reserved. May only be used pursuant to a Tivoli Systems Software License Agreement, an IBM Software License Agreement, or Addendum for Tivoli Products to IBM Customer or License Agreement. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without prior written permission of IBM Corporation. IBM Corporation grants you limited permission to make hardcopy or other reproductions of any machine-readable documentation for your own use, provided that each such reproduction shall carry the IBM Corporation copyright notice. No other rights under copyright are granted without prior written permission of IBM Corporation. The document is not intended for production and is furnished as is without warranty of any kind. All warranties on this document are hereby disclaimed, including the warranties of merchantability and fitness for a particular purpose. U.S. Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corporation. Trademarks IBM, the IBM logo, Tivoli, the Tivoli logo, AIX, NetView, RS/6000, and TME are trademarks or registered trademarks of International Business Machines Corporation or Tivoli Systems Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Other company, product, and service names may be trademarks or service marks of others. Notices References in this publication to Tivoli Systems or IBM products, programs, or services do not imply that they will be available in all countries in which Tivoli Systems or IBM operates. Any reference to these products, programs, or services is not intended to imply that only Tivoli Systems or IBM products, programs, or services can be used. Subject to valid intellectual property or other legally protectable right of Tivoli Systems or IBM, any functionally equivalent product, program, or service can be used instead of the referenced product, program, or service. The evaluation and verification of operation in conjunction with other products, except those expressly designated by Tivoli Systems or IBM, are the responsibility of the user. Tivoli Systems or IBM may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to the IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, New York , U.S.A. See also Additional Notices on page ix.

5 Contents Preface... v Who Should Read This Guide... v Prerequisite and Related Documents... v What This Guide Contains.... v Conventions Used in This Guide... vi Accessing Publications Online... vi Ordering Publications... vii Providing Feedback about Publications... vii Contacting Customer Support... vii Additional Notices... ix OpenSSL License.... ix Original SSLeay License... ix Apache and Apache Tomcat.... x Chapter 1. Overview of Tivoli Kernel Services... 1 Tivoli Kernel Services Components and Services... 2 Administering Tivoli Kernel Services Using the Tivoli Console... 3 Administering Tivoli Kernel Services Using the Command Line Interface (CLI) Chapter 2. A New Tivoli Console... 5 Layout of the Tivoli Console... 5 Locating and Performing Tasks... 6 Embedded User Assistance... 7 Tivoli Console Guided Tour... 8 Chapter 3. Administer Security... 9 Adding Users Associating Users with Accounts Signon Methods Adding a Kernel Account to a User Adding a Native Account to a User Super Administrators Creating Roles Assigning Roles to a User Tivoli Kernel Services Roles Introducing Tivoli Kernel Services iii

6 Viewing User Properties Viewing Users, Resources, and Roles Administering the Security Registry Copying Objects in the Security Registry Searching for Objects within the Security Registry Chapter 4. Administer Logging Viewing Logs Configuring Loggers, Handlers, and Masks Chapter 5. Administer Management Software Managing ORBs and ORB Sets Managing and Deploying Components Managing the Directory Managing Events Managing Communications Managing Gateways Managing SNMP Device Configuration Appendix A. System-Defined Roles Appendix B. Using the NEL Service and Gateway in a Secure Environment Accessing a NEL Service Instance Accessing a Gateway Instance Accessing a Network Device (Endpoint) Example Solution Solution Solution Example Solution Solution Example Index iv Version 1.2

7 Preface Introducing Tivoli Kernel Services Administration provides an introduction to using the Tivoli Console to accomplish Tivoli Kernel Services administrative functions. This document does not provide step-by-step instructions for performing specific tasks. For task details, see the embedded user assistance provided with the Tivoli Console. Who Should Read This Guide This document is written for the Tivoli Kernel Services administrator who is using the Tivoli Console. Prerequisite and Related Documents Tivoli Kernel Services provides the following related documentation: Planning for Tivoli Kernel Services Explains how to plan for deploying Tivoli Kernel Services in your operating environment. Installing Tivoli Kernel Services Provides information about installing, deploying, and configuring Tivoli Kernel Services. Tivoli Kernel Services Command Reference Provides information about the command line interface to Tivoli Kernel Services. Tivoli Kernel Services Command Quick Reference Card A quick reference showing a summary of the command line interface for Tivoli Kernel Services. Troubleshooting Tivoli Kernel Services Provides information about troubleshooting and maintaining the services, components, and databases that comprise Tivoli Kernel Services. Tivoli Kernel Services README Provides late-breaking information, such as problems and workarounds and patch availability. Guided Tour of the Tivoli Console An HTML-based introduction to the Tivoli Console, the graphical user interface used to administer Tivoli Kernel Services. The documentation for Tivoli Kernel Services, with the exception of the integrated online help and the product README, is located in the tivolidocs subdirectory on both the Tivoli Kernel Services Installation CD-ROM and the Bootprint CD-ROM, in both HTML and PDF formats. The product README is located in the root directory of the Installation CD-ROM. What This Guide Contains Introducing Tivoli Kernel Services Administration contains the following sections: Overview of Tivoli Kernel Services on page 1 Provides a brief overview of Tivoli Kernel Services. A New Tivoli Console on page 5 Introducing Tivoli Kernel Services v

8 Presents details about the Tivoli Console, a role-based graphical user interface (GUI) in which tasks are organized to support specific roles. Administer Security on page 9 Provides details about managing security, including information about adding and editing users and managing security roles. Administer Logging on page 27 Explains how to manage the messages and data created from within a component or application and sent to an output destination. Administer Management Software on page 31 Provides information about administering the Tivoli Kernel Services system, including managing ORBs and ORB sets, configuring components, and managing the database and directory. System-Defined Roles on page 43 Provides descriptions of all the system-defined roles provided with Tivoli Kernel Services. Using the NEL Service and Gateway in a Secure Environment on page 47 Explains the security considerations for accessing network devices, or endpoints. Conventions Used in This Guide The document uses several typeface conventions for special terms and actions. These conventions have the following meaning: Bold Italics Monospace Commands, keywords, authorization roles, or other information that you must use literally appear like this, in bold. Names of windows, dialogs, and other controls also appear like this, in bold. Variables and values that you must provide appear like this, in italics. Words and phrases that are emphasized also appear like this, in italics. Code examples, output, system messages, XML tags, and Java class, method, and interface names appear like this, in a monospace font. This document uses the UNIX convention for specifying environment variables and for directory notation. When using the Windows NT command line, replace $variable with %variable% for environment variables and replace each forward slash (/) with a backslash (\) in directory paths. Note: When using the bash shell on a Windows NT system, you can use the UNIX conventions. Accessing Publications Online The Tivoli Customer Support Web site ( offers a guide to support services (the Customer Support Handbook); frequently asked questions (FAQs); and technical information, including release notes, user s guides, redbooks, and white papers. You can access Tivoli publications online at The documentation for some products is available in PDF and HTML formats. Translated documents are also available for some products. vi Version 1.2

9 To access most of the documentation, you need an ID and a password. To obtain an ID for use on the support Web site, go to Resellers should refer to for more information about obtaining Tivoli technical documentation and support. Business Partners should refer to Ordering Publications for more information about obtaining Tivoli technical documentation. Ordering Publications Order Tivoli publications online at or by calling one of the following telephone numbers: U.S. customers: (800) Canadian customers: (800) Providing Feedback about Publications We are very interested in hearing about your experience with Tivoli products and documentation, and we welcome your suggestions for improvements. If you have comments or suggestions about our products and documentation, contact us in one of the following ways: Send to pubs@tivoli.com. Fill out our customer feedback survey at Contacting Customer Support The Tivoli Customer Support Handbook at provides information about all aspects of Tivoli Customer Support, including the following: Registration and eligibility. How to contact support, depending on the severity of your problem. Telephone numbers and addresses, depending on the country you are in. What information you should gather before contacting support. Introducing Tivoli Kernel Services vii

10 viii Version 1.2

11 Additional Notices OpenSSL License Copyright (c) The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. ( 4. The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact 5. Products derived from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). Original SSLeay License Copyright (C) Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscape s SSL. Introducing Tivoli Kernel Services ix

12 This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson Copyright remains Eric Young s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). The word cryptographic can be left out if the routines from the library being used are not cryptographic related. 4. If you include any Windows-specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: This product includes software written by Tim Hudson (tjh@cryptsoft.com) THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License.] Apache and Apache Tomcat This product includes software developed by The Apache Group for use in the Apache HTTP Server project ( This product includes software developed by Greg Stein <gstein@lyra.org> for use in the mod_dav module for Apache ( x Version 1.2

13 This product includes software derived from software developed by Henry Spencer. This product includes software derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. Portions of certain components of the Program are copyrighted by MERANT, Introducing Tivoli Kernel Services xi

14 xii Version 1.2

15 1 Overview of Tivoli Kernel Services 1. Overview of Administration Tivoli Kernel Services provides applications with a set of components and functions for managing a wide variety of users, devices, and services. Built on common communications, messaging, data storage, and logging services, and enhanced with security and a new role-based user interface, Tivoli Kernel Services provides: Greatly extended scalability. With Tivoli Kernel Services, you can manage more devices than is possible with any other current Tivoli systems management products. A single management infrastructure around which you can grow your systems management environment. An environment optimized for management of multiple customers (rather than single enterprise). Flexible deployment solutions that can address huge enterprises with many devices to manage or small shops with fewer devices. Tivoli Kernel Services grows with your company. Tivoli s next-generation graphical user interface. A dependable, fault-tolerant environment. Continuous availability through modular updates that do not require taking the entire system down to make upgrades. Integrated services for systems, applications, and network management Much like an operating system, Tivoli Kernel Services provides the following major functions of a distributed system (as shown in Figure 1 on page 2): Base services, such as communications, data storage, and security The Tivoli Console, a role-based, intuitive graphical user interface Device management, such as SNMP devices and storage devices Introducing Tivoli Kernel Services 1

16 Tivoli Console Applications Device Management User Hardware Tivoli Kernel Services Figure 1. Distributed system environment Tivoli Kernel Services Components and Services Tivoli Kernel Services is composed of the following types of components and services: Core services The core services of Tivoli Kernel Services provide basic capabilities that are fundamental to the operation of the distributed system or that provide services that should be used consistently across the system by all other components. This group of components includes the ORB (the central routing and and control component for Tivoli Kernel Services) and services for validating a user s identity and access rights, sharing and storing data, and delivering messages throughout the distributed system. Component level components The component level components of Tivoli Kernel Services provide a means by which the pieces of applications and services can be managed across the Tivoli Kernel Services system. This group of components includes services for deploying components for the most efficient operation of Tivoli Kernel Services, installing the software, and deploying the software to the correct locations. Resource level components The resource level components of Tivoli Kernel Services are those that provide direct access to resources in the distributed system. This group of components includes the gateways, the locator service that determines which gateway to use for a particular resource, and the protocol stacks and metadata used to communicate with the resources. Application level components In addition to the base functions provided by Tivoli Kernel Services, a few components are provided that can be considered applications in their own right, or at least parts of an application rather than part of Tivoli Kernel Services. This group of components includes the Tivoli Console and the command line interface (CLI) that allow for the operation of Tivoli Kernel Services itself. 2 Version 1.2

17 Administering Tivoli Kernel Services Using the Tivoli Console The Tivoli Console is the graphical user interface (GUI) for Tivoli Kernel Services Administration. The Tivoli Console is the primary interface used to perform user and systems management tasks for Tivoli Kernel Services and the applications running on Tivoli Kernel Services. The Tivoli Console provides a single interface in which to perform system administration tasks, regardless of applications or components installed. For details describing the Tivoli Console and its features, see A New Tivoli Console on page Overview of Administration Using Tivoli Kernel Services Administration, you can manage the following components and services of Tivoli Kernel Services: Data Connections Provide uniform access to a wide range of data stores. Directory Deployment Gateway Maps objects to their location in the system. It also stores some of the attributes for those objects, providing a system-wide, distributed, hierarchical data store. Makes components and services available throughout the distributed system. Manages the communications and connections between a group of endpoints and Tivoli Kernel Services. The gateway converts server protocols to endpoint protocols, and vice versa. Logging Manages the logging of component messages and trace data within the distributed system. Messaging Service Provides the backbone for messages between components and applications. These messages include things like system events and notification of configuration changes. Network Endpoint Locator Service Checks security access to a resource and establishes the best gateway possible for an application to pass commands and data to and from an endpoint. Security Provides authorization and authentication to a Tivoli Kernel Services installation. SNMP Device Configuration Manages SNMP configuration information for IP resources in a Tivoli Kernel Services installation. Tivoli Kernel Services Administration is organized into the three task groups, which cover overall system administration, system security administration, and system logging administration. See the following chapters for more details describing the tasks provided in each of the task groups: Administer Security on page 9 Administer Logging on page 27 Administer Management Software on page 31 Introducing Tivoli Kernel Services 3

18 Administering Tivoli Kernel Services Using the Command Line Interface (CLI) Tivoli Kernel Services also provides a CLI that allows you to perform system operations from a command line instead of using the Tivoli Console. The command line interface can be run without the GUI running or in a separate window while the GUI is also running. The CLI provides complete control of the managed environment and can easily be used by shell scripts to perform complex sequences of commands. This document focuses on administering Tivoli Kernel Services using the Tivoli Console. For details about the CLI and the syntax of commands, see the Tivoli Kernel Services Command Reference. 4 Version 1.2

19 2 A New Tivoli Console The Tivoli Console is the role-based graphical user interface (GUI) for performing tasks using Tivoli management software. It presents only the tasks that are relevant to your particular role, and enables you to perform tasks without having to understand the details of the underlying software. The Tivoli Console also provides consistent controls and behaviors across tasks and includes embedded user assistance. A role is a job function, such as software distributor, that identifies the tasks that you can perform and the resources to which you have access. You might be assigned one or more roles depending on the duties that you perform. A task represents one or more Tivoli software components that run as an independent entity to accomplish your work. 2. A New Tivoli Console Layout of the Tivoli Console Figure 2 shows an example of the Tivoli Console in Tivoli Kernel Services. Banner area Tivoli Assistant Portfolio Work area Status bar Task button Taskbar Figure 2. Key components of the Tivoli Console The key components of the Tivoli Console include the following: Banner area The area between the title bar and the menu bar that can serve as a Web browser. This optional area can be customized by a system administrator to include relevant Introducing Tivoli Kernel Services 5

20 information for a particular organization. For example, an organization might want to include the role description for a particular user, the company logo, or links to Internet and intranet sites in this area. Portfolio A container for the tasks that are relevant for a given role. When open, the portfolio displays within the Tivoli Console to the left of the work area. When closed, the portfolio is indicated by the portfolio handle. Status bar A bar located below the work area that is divided into two sections. The section on the left contains information about the object over which the mouse pointer is hovering. The section on the right contains a progress indicator or status information about the task that is running. To lengthen one section of the status bar and shorten the other, drag the sectional divider to the left or to the right. Taskbar A bar located at the bottom of the window that contains a button, called a task button, for each task that is running. When you right-click the background of the taskbar, the context menu for the taskbar opens. Task button A button on the taskbar that represents a task that is running. A task might have multiple windows associated with it. When you click a task button, the window associated with the task opens in the work area. When you right-click a task button, the context menu for that task opens. Each task button also includes a small icon that conveys the current status of the task. Work area The area in which the GUI for a task is displayed. This area does not include the portfolio and the Tivoli Assistant. Tivoli Assistant The place to go for answers to your questions. The Tivoli Assistant is opened by the question mark located on the far right of the toolbar or in the upper right of any detached window. When it is open, the Tivoli Assistant displays within the Tivoli Console to the right of the work area. It provides contextual help information for the task that you are performing, as well as reference information. Locating and Performing Tasks Your tasks are arranged into task groups, which organize your tasks into logical categories. These task groups are displayed in the portfolio of the Tivoli Console. To view the list of tasks under a particular task group, click the task group to expand it. When the task group is expanded, click the task that you want to start within that group. Clicking a task either opens a dialog that guides you through an activity or presents you with a list of resources on which you can perform actions. When presented with a list of resources, you can right-click a resource to open a context menu. The context menu displays only those actions that are relevant for that resource. The menu and the toolbar are task-specific and contain the available menus and tools for the task that is active in the work area. However, several menu items and tools remain the same for all tasks. 6 Version 1.2

21 In addition to the items listed here, some of the applications using the Tivoli Console make use of a field description area, which displays descriptive text and instructions within the interface and is automatically updated as a user moves from field to field. However, this area is not being used by Tivoli Kernel Services in this release. Embedded User Assistance The Tivoli Console offers an important new feature, embedded user assistance through the use of the Tivoli Assistant. The Tivoli Assistant can be opened by: Clicking the question mark located on the far right of the toolbar of the Tivoli Console or in the upper right of a detached window. Selecting Open Tivoli Assistant from the Help menu item. Pressing F1. The Tivoli Assistant replaces the User s Guide that accompanies most software products. Information about Tivoli Kernel Services, the Tivoli Console, and the Tivoli Assistant itself is all included in the Tivoli Assistant. When you install an application, application information is seamlessly integrated into the Tivoli Assistant as well. 2. A New Tivoli Console The information in the Tivoli Assistant is organized by topic. The topic relevant to the task that you are performing is displayed to the right of the work area when you initially open the Tivoli Assistant, as illustrated in Figure 3. Tivoli Assistant toolbar Tivoli Assistant Figure 3. Tivoli Console with Tivoli Assistant open You can search the information available, review overview information, or view the table of contents and index to locate the information you want. Once you ve located the information, you can resize the Tivoli Assistant window for easier viewing, detach the window from the work area entirely, or print the information. These tasks can be performed by using the Tivoli Assistant toolbar, shown in Figure 4 on page 8. Introducing Tivoli Kernel Services 7

22 Message Index Topic Index Table of Contents Previous/Next Search Print Detach/Reattach Snap Figure 4. Tivoli Assistant toolbar From the Tivoli Assistant toolbar, you can access a Message Index that contains pointers to message help topics for all installed applications. It is sorted alphanumerically by message identifier and has a search function. Generally, these messages are displayed in pop-up dialogs that require user action as shown in Figure 5. You can get help information for message dialogs just like any other dialog by clicking the question mark in the upper right of the dialog box. Figure 5. Message window Tivoli Console Guided Tour Before you begin using the Tivoli Console, you might be interested in taking a Web-based guided tour to reinforce the concepts presented in this chapter. The guided tour is included on the installation CD-ROM in the tivolidocs subdirectory. You can also download the guided tour from the following Web site: 8 Version 1.2

23 3 Administer Security The Administer Security task group includes tasks to administer system security. These tasks provide authentication and authorization services for components, applications, services, and users. Figure 6. Administer Security task group The Security subsystem is composed of the Authentication Service, which validates a user s identity, and the Authorization Service, which determines whether a user has the right to execute a specific action or access a specific resource. These two services are run on objects contained within the security registry. The security registry is a data management server that provides a consistent representation and repository of information related to users and access control of resources. For more information on the security registry, its organization, and planning aspects of security, see Planning for Tivoli Kernel Services. 3. Administer Security The first step in securing the distributed system is to create users. A user is a person who will use Tivoli Kernel Services to perform tasks. This user, in order to access the system, needs one or more accounts. These accounts contain the user s credentials, such as a user name and password. When a user signs on to the system, the Authentication Service checks that the user name and password entered match the information contained within that user s account. (See Associating Users with Accounts on page 11 for more information on accounts.) Once the user has access to the system, the tasks that he can perform will be determined by the roles he is assigned. A role is a job function that defines the access conditions that a user has on a set of resources. Introducing Tivoli Kernel Services 9

24 Adding Users To create a new user within Tivoli Kernel Services, select the Add User task in the Administer Security task group in the portfolio. From the User window, as shown in Figure 7, you can create users. Figure 7. User window Note: When creating a new user using the Add User task, a Directory Chooser window is displayed that allows you to choose the security registry directory in which the new user will be located. Alternatively, you can select the directory in the security registry where you want the user to be located and then click the Add User icon ( create the new user in the selected directory. )to 10 Version 1.2

25 Once the user is created, the User Properties window is displayed. From this window, shown in Figure 8, you can view and edit user properties and create, edit, or delete a user s accounts. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. Figure 8. User Properties window Associating Users with Accounts After a user has been created in Tivoli Kernel Services, you can associate an account, or accounts, with that user. A user requires an account to enter the system. There are two main types of accounts in Tivoli Kernel Services: 3. Administer Security Kernel accounts This type of account is defined within the Tivoli Kernel Services security registry and requires a user name and password to sign on with. The account type is named Kernel account. Native accounts This type of account is defined on a native operating system, such as the Windows or UNIX platforms, and requires a user name, host name, and password to sign on with. Native account types include the following: v v NT account Unix account When creating a native account, you must ensure the account name is unique within the installation. If two accounts are created with the same name, both accounts will be invalidated. Note: The following account types exist in Tivoli Kernel Services, but are not currently used: Introducing Tivoli Kernel Services 11

26 v v Web account DB2 account A user can have multiple accounts and multiple types of accounts. For example, a user can sign on using an NT account, Unix account, or Kernel account. If you want to sign on to the Tivoli Console using an account that differs from what was originally used to sign on, close and restart the Tivoli Console, and then enter the user name and password in the signon window. Signon Methods The following signon methods can be used to sign on to the Tivoli Kernel Services command line interface or GUI. When associating accounts with a user, consider the signon method they will be using to perform their work. Kernel account signon method The Kernel account signon method allows you to sign on using both the GUI and command line interface with a Kernel account. This method requires users to enter the u option with the wcmd command. Kernel account passwords are stored in the security registry. Native local signon method The native local signon method can perform native local authentication by way of the command line interface only. This type of signon eliminates the need to enter the u option with the wcmd command and enables batch processing of the commands. Native remote signon method The native remote signon method can be used for signing on using both the GUI and command line interface by entering user@hostname for the user name. Notes: 1. The native remote signon method requires that the RemoteAuthenticationService be deployed to the ORB on the machine where the users you want to remotely authenticate are defined. If you want to support Windows NT domains and native remote authentication, there must not be any local account name conflicts with the domain on this machine. (For more information on deploying components, see Managing and Deploying Components on page 33). 2. In a Windows environment, the ORB should be started from the Control Panel to use the native remote signon method on that ORB. If the command line is used instead, the user starting the ORB must have act as part of the operating system user right assigned to use the native remote signon method. To set the user rights on Windows 2000 systems: a. From the Start menu, select Settings Control Panel Administrative Tools Local Security Policy Local Policies User Rights Assignment. b. Right-click the Act as part of the operating system policy and select Security. c. Add the user. To set the user rights on Windows NT systems: a. From the Start menu, select Programs Administrative Tools User Manager. 12 Version 1.2

27 b. From the Policies menu, select User Rights. c. Select the Show Advanced User Rights check box. d. From the Right drop-down list, select Act as part of the operating system. e. In the Grant To list, select the user name or group and click OK. Adding a Kernel Account to a User The following steps demonstrate how to add a Kernel account to a user. 1. From the portfolio, select Administer Security View Users, Resources, Roles. 2. In the Security Registry window, locate the person object that you want to add the account to. 3. Double-click the person. 4. In the User Properties window (next to the Accounts table), click New. 5. Select Kernel account and click OK. 3. Administer Security 6. In the Account window: a. In the Full name field, type the user name that this person will use to sign on to the system. For example, eap. b. Leave the Computer hostname field empty. Host names are not used for Kernel accounts. c. In the Password field, type a password that this person will use to sign on to the system. d. Click OK to create the account. Introducing Tivoli Kernel Services 13

28 Adding a Native Account to a User The following steps demonstrate how to add a new native account to a user. 1. From the portfolio, select Administer Security View Users, Resources, Roles. 2. In the Security Registry window, locate the person object that you want to add the account to. 3. Double-click the person. 4. In the User Properties window (next to the Accounts table), click New. 5. Select either NT account or Unix account corresponding to the native operating system type and click OK. 6. In the Account window: a. In the Full name field, type the user name that the user signs on with on the native operating system. For example, epresley. 14 Version 1.2

29 b. In the Computer hostname field, type the fully qualified host name of the machine the user signs on with. For example, machine1.dev.tivoli.com. c. Leave the Password field empty. The native operating system password is used to authenticate the user. Not entering a password prevents you from having to keep the password that is stored in the security registry in synch with the operating system password. d. Click OK to create the account. To test the new account, the user can enter wcmd list from a command prompt. If the account was created successfully, the command will not require the u option to specify a user name. To use this same account to sign on to the Tivoli Console, ensure that the RemoteAuthenticationService has been deployed to the ORB where the users you want to remotely authenticate are defined. In the signon window, the user must enter their user name in the format user@hostname as shown in Figure 9 and enter their operating system password for the password. 3. Administer Security Figure 9. Native remote signon method Introducing Tivoli Kernel Services 15

30 Super Administrators Tivoli Kernel Services provides a special user and account called a super administrator. This super administrator has access to the entire Tivoli Kernel Services installation including the security registry, and is automatically assigned to all roles, predefined or newly created, in the system. The user is located in the security/superadministrators/ directory of the security registry, and the user name is John D. Super. By default this user is associated with a Kernel account named superadmin. To create additional super administrators, you should copy this user, rename it making sure to keep it within the SuperAdministrators directory, and assign it a new signon account with an updated user ID and password. For step-by-step instructions, see Copying Objects in the Security Registry on page 25. Any additional super administrators created in the SuperAdministrators directory are also automatically assigned to all roles, predefined or newly created, in the system. Creating Roles Tivoli Kernel Services uses the concept of role-based access control to manage system security. Rather than specifying security permissions for individual users or groups, you create capabilities that a user assigned to the role can perform on a set of targets. Capabilities are a set of access conditions, which are permissions to perform certain actions, on a group of resources (targets). A capability can group together several conditions such as READ, WRITE, and DELETE. Consider these guidelines when you create your own roles: The role name should reflect job function. A role corresponds to a job function and has a name that should describe that job function. It seems intuitive that a person s (or an application s) access to resources should be based on that person s (or that application s) function or functions within the organization. A user can have zero, one, or more than one role. Each role contains a set of capabilities. Each capability has an identifier that is unique within the role. Each capability confers a set of access conditions to a set of resources. A role is a combination of rights plus conditions. Each access condition represents an action that a user is allowed to perform on a resource. Each type of resource may support a different set of actions, so the set of valid rights will depend on the type of resource. Users are assigned dynamically or statically to roles. After you create a user and determine which roles are appropriate for that user, you can statically assign the roles to the user or create filters to dynamically assign the roles to users. Resources are assigned dynamically or statically to capabilities. After you have created a capability and determine which resources are appropriate for that capability, you can statically assign resources to the capability or create filters to dynamically assign resources to the capability. To create a new role within Tivoli Kernel Services, select the Add Role task in the Administer Security task group in the portfolio. From the Role window, as shown in Figure 10 on page 17, you can create and edit roles. Note: When creating a new role using the Add Role task, a Directory Chooser window is displayed that allows you to choose the security registry directory in which the new role will be located. Alternatively, you can select the directory in the security registry 16 Version 1.2

31 where you want the role to be located and then click the Add Role icon ( create the new role in the selected directory. )to Figure 10. Role window 3. Administer Security Introducing Tivoli Kernel Services 17

32 Once the role is created, the Role Properties window is displayed. From this window, shown in Figure 11, you can view and edit role properties and create, edit, or delete a role s capabilities and access conditions. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. Figure 11. Role Properties window Assigning Roles to a User Users can be associated with roles either statically or dynamically. The following steps demonstrate how to statically associate a user with a role. 1. From the portfolio, select Administer Security View Users, Resources, Roles. 2. In the Security Registry window, double-click a user. The User Properties window is displayed. 3. In the User Properties window, click Edit. 18 Version 1.2

33 4. In the User window, select Statically Assigned Roles. The roles that are currently statically assigned to the user are displayed. 5. Click New to display any additional roles that are available to assign to the user. 6. Select the desired roles and click OK. 7. In the User window, click OK to save the changes. Users can be associated with a role dynamically by way of a role member filter. To add a member filter to a role: 1. From the portfolio, select Administer Security View Users, Resources, Roles. 2. In the Security Registry window, double-click the role. 3. In the Role Properties window, click Edit. 4. In the Role window, select Member Filter. 5. Select a property from the Property drop-down list. For example, Department. 3. Administer Security Introducing Tivoli Kernel Services 19

34 6. Type a value for the property in the text field. For example, Click OK to save the member filter. In this example, all users added to the system (in addition to any existing users) with the attribute Department=123, will be dynamically assigned to this role. After you have set up the users, roles, accounts, and capabilities in the system, the Authorization Service uses that information when a user tries to perform an action on a resource, and it checks that the user has the proper role, capability, and access conditions to perform the specified actions on or against the resource. Once the user has been authenticated and authorized to perform actions, it is called a principal. Tivoli Kernel Services Roles Two types of roles exist within Tivoli Kernel Services: Tivoli Kernel Services roles, which control the actions a user can perform when using the portfolio tasks. These roles are located in the security/roles/, system/services/roles/, or system/roles/ directories in the security registry. Tivoli Kernel Services Administration roles, which indicate which portfolio tasks are available to a user assigned to that role. These roles are located in the PS/PSServer/Roles/MACImpl/5.2.0/ directory in the security registry. You must assign both types of roles to a user so that users have access to the appropriate portfolio tasks and can perform the proper actions with these portfolio tasks. For a full list of system-defined roles available within Tivoli Kernel Services, see System-Defined Roles on page 43. Table 1, Table 2 on page 21, Table 3 on page 21, and Table 4 on page 22 show the location within the security registry and a description for the Tivoli Kernel Services and Tivoli Kernel Services Administration roles needed to give a user access to portfolio tasks. Table 1. Roles located in the PS/PSServer/Roles/ directory of the security registry PS/PSServer/Roles/ MACImpl/5.2.0/MACInstallUser Role that allows users to perform all system administration functions. Provides access to all tasks within all task groups. 20 Version 1.2

35 Table 1. Roles located in the PS/PSServer/Roles/ directory of the security registry (continued) PS/PSServer/Roles/ MACImpl/5.2.0/MACLimitedSecurityUser Role that allows users to view security information for the user and account the user signed on to the console with, and search for security resources. Provides access to View User Properties and Search Security tasks within the Administer Security task group. MACImpl/5.2.0/MACLoggingUser Role that allows users to perform logging administration functions. Provides access to all tasks within the Administer Logging task group. MACImpl/5.2.0/MACOrbUser Role that allows users to perform ORB, ORB set, component, and data connection administration functions. Provides access to Manage ORBs, View Data Connections, and View SNMP Configuration tasks. MACImpl/5.2.0/MACResourceUser Role that allows users to perform directory administration functions. Provides access to the View Directory task. MACImpl/5.2.0/MACSecurityUser Role that allows users to perform security administration functions. Provides access to all tasks within the Administer Security task group. MACImpl/5.2.0/MACSeniorUser Role that allows users to perform all system administration functions. Provides access to all tasks within all task groups. 3. Administer Security Table 2. Roles located in the security/roles/ directory of the security registry security/roles/ Administrator Role that provides full access to all objects in the security registry. User Administrator Role that grants authority to work with accounts and persons only, does not have authority to work with roles. Can add, delete, and edit accounts and persons anywhere in the security registry with the exception of the security directory. Does not have the authority to use the security CLI commands. Table 3. Roles located in the system/services/roles/ directory of the security registry system/services/roles/ DirectoryService Role that grants full access to the Directory Service. Do not delete this role as it is used by internal services. Introducing Tivoli Kernel Services 21

36 Table 4. Roles located in the system/roles/ directory of the security registry system/roles/ Logging Administrator System Administrator Role that grants authority to manage loggers, handlers, and filters (masks). Role that provides end-user access to all Tivoli Kernel Services except for the security registry. Provides access to all CLI commands except for security commands. Table 5 shows the combination of Tivoli Kernel Services Administration roles and Tivoli Kernel Services roles needed to give a user access to portfolio tasks. For example, if you want to give someone the authority to work with accounts and persons in the security registry, but want to limit their ability to edit or assign roles, then you could assign them the MACLimitedSecurityUser role and the User Administrator role. The first role grants a user access to a limited set of portfolio tasks, and the second role gives that user the permissions necessary to work with account and persons in the security registry. Table 5. Roles and access to portfolio tasks Tivoli Kernel Services Tivoli Kernel Services Role Administration Role MACSeniorUser System Administrator and Administrator MACInstallUser MACLoggingUser MACOrbUser MACResourceUser System Administrator and Administrator Logging Administrator System Administrator DirectoryService Access Available All tasks are available Grants full authority to all of Tivoli Kernel Services and the security registry All tasks are available Grants full authority to all of Tivoli Kernel Services and the security registry Access to all tasks within the Administer Logging task group Grants authority to manage loggers, handlers, filters (masks) Access to Manage ORBs, View Data Connections, and View SNMP Configuration tasks Can perform ORB, ORB set, component, and data connection administration functions Grants full access to Tivoli Kernel Services except for the security registry Access to the View Directory task Grants full access to the Directory Service 22 Version 1.2

37 Table 5. Roles and access to portfolio tasks (continued) Tivoli Kernel Services Administration Role MACLimitedSecurityUser MACSecurityUser Tivoli Kernel Services Role User Administrator Administrator Access Available Access to View User Properties and Search Security tasks Grants authority to work with accounts and persons only Can add, delete, and edit accounts and persons anywhere in the security registry with the exception of the security directory Access to all tasks within the Administer Security task group Grants full access to all objects in the security registry Viewing User Properties To display account and user information for the account and user you signed on as, select the View User Properties task in the Administer Security task group in the portfolio. From this window, shown in Figure 12, you can view and update user and account information. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. 3. Administer Security Figure 12. View User Properties window Introducing Tivoli Kernel Services 23

38 Viewing Users, Resources, and Roles To display the main navigation window for the security registry, select the View Users, Resources, Roles task in the Administer Security task group in the portfolio. From this window, as shown in Figure 13, you can move or rename objects, and create or edit accounts, users, roles, principals, organizational units, and capabilities. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. Figure 13. Security Registry window Administering the Security Registry Once users, accounts, and roles have been created, they can be organized into logical parts. Within the security registry, you can create organizational units, which are containers for all security objects. These containers can be used to organize security objects according to departments or business units within an organization, or any other logical division. After you define organizational units, you can associate those security objects with each other. You can manually form and maintain these associations, or you can create filters to dynamically create those associations. These filters, or queries, associate users with roles and accounts, or capabilities and access conditions to targets, and so on. Queries are created using object class types, which are data entries or objects within the security registry. Queries using object class types can be very general and high-level, such as filtering for all users or roles, as well as more detailed, such as filtering based on a user s last name or telephone number. As the data changes, associations between objects change. For more information on the security registry, its organization, and planning aspects of security, see Planning for Tivoli Kernel Services. 24 Version 1.2

39 Copying Objects in the Security Registry There are several reasons you might want to copy objects in the security registry. For example, you might want to create a role that is only slightly different from another role. You can clone, or copy and rename, the role as follows: 1. From the portfolio, select Administer Security View Users, Resources, Roles. 2. In the Security Registry window, locate the role you want to copy. 3. Right-click the role and select Copy from the context menu. 4. Select the directory where you want the new role to be located. 5. From the Edit menu, select Paste. 6. Right-click the new role and select Rename from the context menu. 7. Enter a meaningful name for the new role. The person objects in the SuperAdministrators folder are treated specially. As new roles get added to the system, any person object in the SuperAdministrators folder will be assigned the new role. The person will accumulate all roles added after the person was added. For this reason if you want to create persons that have all system roles, you must copy and rename the person. For example: 1. From the portfolio, select Administer Security View Users, Resources, Roles. 2. In the Security Registry window, open the security SuperAdministrators folder. 3. Right-click the John D. Super person and select Copy from the context menu. 4. Select the SuperAdministrators folder. 5. From the Edit menu, select Paste to make a copy of the person object. By default the new name will be John D. Super1. 6. Double-click John D. Super1 and edit the user information to correctly identify the person. 7. Assign the user a new signon account with an updated user name and password. Searching for Objects within the Security Registry To create a filtering query that will search through the security registry for matching objects, select the Search Security task in the Administer Security task group in the portfolio. From this window, shown in Figure 14 on page 26, you can search for users, roles, accounts, capabilities, and targets within the security registry. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. 3. Administer Security Introducing Tivoli Kernel Services 25

40 Figure 14. Searching within the security registry 26 Version 1.2

41 4 Administer Logging 4. Administer Logging The Administer Logging task group displays system logging administrative tasks. Logging refers to the messages and data created from within a component or application and sent to an output destination such as a file, a database, a console screen, and so on. Tivoli Kernel Services supports two types of logging: Local, which is logging within a single environment Distributed, which is logging across multiple environments Figure 15. Administer Logging task group The Logging subsystem of Tivoli Kernel Services uses several objects to record system events. These objects include loggers, handlers, and filters (also referred to as masks). Loggers are software objects that record events that occur while a component is operating. The Logging subsystem supports two types of loggers: message loggers and trace loggers. Message loggers are used to record textual messages from a Tivoli Kernel Services component. These messages are internationalized for individual locales. The message types associated with a message logger, which are all enabled by default, include: Informational messages Indicate conditions that are worthy of noting but that do not require a user to take any precautions or perform an action. Warning messages Inform a user that a condition has been detected that they should be aware of, but it does not necessarily require them to take action. For example, this message type might indicate some aspect of a program did not perform as intended, but the defaults were applied so the program could continue to operate, but the output should be examined for validity. Introducing Tivoli Kernel Services 27

42 Viewing Logs Error messages Inform a user of serious events, such as a component failed to write a database entry. Fatal messages Indicate the most serious errors, such as errors that require an ORB to be restarted or that a component has shut down because attempts to recover from an error have failed. Trace loggers are used to capture information about the operating environment when component code fails to operate as intended. Tivoli Customer Support personnel use the information captured by trace loggers to trace a problem to its source or to determine why an error occurred. Generally, this information is not enabled by default. Because trace messages are intended for support personnel, they are generally written to a file that can be viewed during a postmortem examination. Handlers are software objects that direct messages recorded by a logger to a destination. Messages can be directed to a file, a database, a console screen, or to other destinations. You associate handlers with loggers to send information recorded by a logger to the desired destination. Filters can be applied to loggers, to handlers, or to both loggers and handlers. When applied to a logger, the filter determines which types of message and trace records the logger processes. When applied to a handler, the filter determines which types of message and trace records the handler sends to a destination. Filters work by comparing a log record type against a set of criteria, or a query, contained within the filter. Having numerous loggers, handlers, and filters can cause you to have an undue amount of logging administration to perform. To reduce the administration burden, you can create groups. A group contains loggers, handlers, or masks that have common properties. By creating groups, a newly created logger, handler, or mask with unset properties can inherit values for those properties from the group. If a logger, handler, or mask belongs to a group and its properties are updated, all other loggers, handlers, or masks in that group will also have that property updated. This eliminates the need for manually updating individual logger, handler, and mask properties. To view all system logs, select the View All Logs task in the Administer Logging task group in the portfolio. To view detailed information about translatable system logs, select the View Translated Logs task in the Administer Logging task group in the portfolio. The View Translated Logs window is the same as the View All Logs window. From the View All Logs window, as shown in Figure 16 on page 29, you can select a particular log entry and view its contents in more detail. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. 28 Version 1.2

43 4. Administer Logging Figure 16. View All Logs window Configuring Loggers, Handlers, and Masks To view, configure, and access system loggers, handlers, and masks within a Tivoli Kernel Services installation, select the Configure Logging task in the Administer Logging task group in the portfolio. From the Configure Logging window, as shown in Figure 17 on page 30, you can manage loggers, handlers, and masks, such as editing their properties, listing their associated logging objects, or deleting them. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. Before performing these tasks, see Troubleshooting Tivoli Kernel Services for information on configuring and setting up logging, including configuring database handlers. Introducing Tivoli Kernel Services 29

44 Figure 17. Configure Logging window 30 Version 1.2

45 5 Administer Management Software In a large-scale distributed system like Tivoli Kernel Services, applications require preference and configuration data to adapt to different environments. Applications also need a way to store, retrieve, and modify this data, regardless of where the data is located. This is accomplished by configuring and managing system objects and system communications. The Administer Management Software task group provides these overall system administrative tasks, including tasks for managing and deploying components, in addition to tasks for managing the directory, events, communications, and ORBs and ORB sets. 5. Administer Management Software Figure 18. Administer Management Software task group Managing ORBs and ORB Sets A Tivoli Kernel Services ORB (object request broker) provides remote access and communications to system components, services, and managed objects. ORBs also handle an object throughout its lifecycle, routing objects throughout the distributed system. Each ORB provides communication mechanisms, which are used by other system components to communicate. When an ORB runs, various services and components communicate remotely, either to or from the ORB. To handle this remote access, the ORB generates proxies, special objects that serve as stand-ins for remote objects. In Tivoli Kernel Services, there is a logical grouping of ORBs that contain components that together perform a particular function (security, for example). These logical groups are called domains and they are implemented using ORB sets. Grouping ORBs into ORB sets reduces the configuration burden by associating specific configuration data to a resource with a group of ORBs that is represented by an ORB set. As components are maintained or Introducing Tivoli Kernel Services 31

46 upgraded, or as machines and ORBs are added to the distributed system, the ORBs automatically pick up the configuration information of the ORB set in which you place the ORBs. One default ORB set, called.allorbs, was created for you when Tivoli Kernel Services was installed. This ORB set allows the user to set configuration data that will be read by every ORB in the system. Another default ORB set, which includes the default read-only configuration data for all ORBs and components within Tivoli Kernel Services, is.orbdefaults. You can create other ORB sets to help you manage Tivoli Kernel Services applications. The ORB sets you create provide the specific configuration data and override the default values provided by.allorbs and.orbdefaults. Additionally, any configuration data you set for the individual ORBs within that ORB set override the values provided for the ORB set to which it belongs. This reverse kind of inheritance is called coalescing. The order for applying configuration data is as follows: 1. ORB-specific configuration data 2. ORB set configuration data 3..allorbs configuration data 4..orbdefaults configuration data Additionally, the following ORB sets are created automatically for you when you deploy Tivoli Kernel Services: DefaultRegion, which nests all ORBs that are part of the default region, currently defined as all the ORBs in your installation, as follows: v orbsindefaultregion, which is all the ORBs that are part of the default region, which nests the following ORB sets: endpointsindefaultregion, which is an ORB set of all the endpoint servers managed by this Tivoli Kernel Services installation. consolesindefaultregion, which is an ORB set of all the machines where the Tivoli Console has been enabled to run in this Tivoli Kernel Services installation. serversindefaultregion, which is an ORB set of all servers in this Tivoli Kernel Services installation that have been dedicated to run Tivoli Kernel Services code. Tivoli Kernel Servers servers can be defined as gateways or general purpose servers. installationdepotorbset, which is an ORB set of one ORB, the installation depot, from which all Tivoli Kernel Services components are served. default_nat, which is an ORB set that is used to store configuration for the default NAT (network address translation) in an installation. Do not modify this ORB set or deploy components to this ORB set. To view, configure, and access the ORBs, ORB sets, and deployed components within a Tivoli Kernel Services installation, select the Manage ORBs task in the Administer Management Software task group in the portfolio. The Manage ORBs window, as shown in Figure 19 on page 33, displays the ORBs, ORB sets, and deployed components (including the default ORB sets previously discussed) within a tree structure. 32 Version 1.2

47 5. Administer Management Software Figure 19. Manage ORBs window From this window, you can navigate through the ORBs, ORB sets, and components, rename objects, upgrade components, and create new ORB sets. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. Managing and Deploying Components Everything in Tivoli Kernel Services is considered a component, which is a piece of code or data that can be installed, run, and upgraded. A component can be a service or it can be a set of code used to implement function directly used by another part of the distributed system. It can also be used by other components to form a fully functioning distributed system. All installation and maintenance of the system is handled in terms of components. The component depot is the repository of all components that can be deployed throughout the distributed system. To view detailed information about the components that are installed on the component depot, select the View Component Depot task in the Administer Management Software task group in the portfolio. From the View Component Depot window, shown in Figure 20 on page 34, you can configure and remove components. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. Introducing Tivoli Kernel Services 33

48 Figure 20. View Component Depot window To view detailed information about namespaces, ORB sets, and components deployed to ORB sets, select the Deploy to ORB Sets task in the Administer Management Software task group in the portfolio. From the Deploy to ORB Sets window, shown in Figure 21 on page 35, you can deploy components to existing ORB sets. You can also manage namespaces and ORB sets and perform various component-related tasks such as configuring, upgrading, removing, and rolling back components. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. 34 Version 1.2

49 5. Administer Management Software Figure 21. Deploy to ORB Sets window A Tivoli Kernel Services installation consists of a large number of components, which are displayed in the View Component Depot window. However, there is only a small number of these components that you might need to consider deploying, or making available, to a specific ORB or ORB set. These components include the following: Component Manager components v ComponentDistributionService v PndScheduler Note: The ComponentDistributionService and PndScheduler components must be deployed together (to the same ORB set using the same deploy action). Directory components v slash v dirservice Gateway components v GatewayIPService v GatewaySNMPService v NelService Logging component v logging Introducing Tivoli Kernel Services 35

50 Security components v AuthenticationService v SecurityDirectoryService v RemoteAuthenticationService Service Manager component v dsm Managing the Directory The Tivoli Kernel Services directory is primarily used as an anchor point for accessing information within the distributed system. All ORBs have access to the directory; therefore, every component running on an ORB has access to the directory. The directory provides access to information using contexts. A context is a container that holds objects at a certain level in the directory. There are two types of contexts: ORB local context and slash context. The ORB local context represents the top-level context of an ORB and is the primary object on which all directory service operations are performed. The slash context provides and maintains directory services across session boundaries for an entire Tivoli Kernel Services installation. The slash context is contained in the directory database, a relational database whose location is defined during installation. This database is used to store configuration information. The directory service also depends on the database for secure storage of data source information. The slash context runs as a service (named slash) and is started by the Service Manager when the slash service is configured to run on an ORB. To view and access directory objects within a Tivoli Kernel Services installation, select the View Directory task in the Administer Management Software task group in the portfolio. The View Directory window, shown in Figure 22 on page 37, displays directory objects within a tree structure. 36 Version 1.2

51 5. Administer Management Software Figure 22. View Directory window Managing Events From this window, you can navigate through the directory, access the local ORB and slash contexts, create new directory folders, rename existing directory folders, and view and configure directory attributes. See the Tivoli Assistant online help system for step-by-step instructions on how to accomplish these tasks. The Messaging Service provides a generic event service. It accomplishes this by using the publish/subscribe communication model. In this model a publisher is a component that publishes messages to a topic. Publishing to a topic causes a message to be generated by the publisher and sent to the topic. A topic is a software object that defines message criteria. Topics are organized hierarchically, so that components and services can subscribe to high or low level topics. A subscriber is a component that requests information about a topic. Subscribers use filters to receive specific, persistent messages. To view system components using the Messaging Service, select the Manage ORBs task in the Administer Management Software task group in the portfolio. From the Manage ORBs window, shown in Figure 19 on page 33, right-click an ORB and select Display Messaging Service Statistics. From the Messaging Service Statistics window, shown in Figure 23 on page 38, you can view or change Messaging Service statistics. See the Tivoli Assistant online help system for step-by-step instructions on how to accomplish these tasks. Introducing Tivoli Kernel Services 37

52 Figure 23. Messaging Service Statistics window Managing Communications A Tivoli Kernel Services installation consists of the following: A set of servers, which support the management infrastructure and applications A set of devices, which represent the physical resources to be managed. Devices, or endpoints, are managed and controlled through agents, which are software entities that run on endpoints and provide management capability for other software or hardware. Tivoli Kernel Services supports SNMP agents through the appropriate gateway and communicates with them using the correct protocol. Note: Each object in the path to accessing a network device the NEL Service, the Gateway, and the device itself is subject to authorization checks. For information describing the security requirements for using these components, see Using the NEL Service and Gateway in a Secure Environment on page 47. Managing Gateways The Gateway Service manages the communications and connections between a group of endpoints and Tivoli Kernel Services. The gateway receives events from resources and passes the events to interested parties within the distributed system. The Network Endpoint Locator (NEL) Service is the Tivoli Kernel Services component that checks the security access to a resource and establishes the best gateway possible for an application to 38 Version 1.2

53 communicate with the endpoint using an action object. An action object represents the connection between an application and a resource. Action objects are created by components and travel to the location (usually a gateway) where the underlying operation can be performed. Action objects pass commands and data to and from the resource through whatever paths they require. To view and edit the NEL Service, select the View Component Depot task in the Administer Management Software task group in the portfolio. From the View Component Depot window, shown in Figure 20 on page 34, right-click the NelService component and select Edit Properties. From the Edit Configuration of NelService window, shown in Figure 24, default and user-defined gateways are displayed. 5. Administer Management Software Figure 24. Edit properties of NelService From this window, you can navigate through the list of user-defined gateways, create new gateways, and configure gateways. See the Tivoli Assistant online help system for step-by-step instructions on how to accomplish these tasks. To view and edit the IP Gateway or SNMP Gateway, select the View Component Depot task in the Administer Management Software task group in the portfolio. From the View Component Depot window, right-click the GatewayIPService component or GatewaySNMPService component and select Edit Properties. In the Edit Configuration of GatewayIPService window, shown in Figure 25 on page 40, (or the Edit Configuration of GatewaySNMPService window), IP gateway configuration information is displayed. Introducing Tivoli Kernel Services 39

54 Figure 25. Edit properties of GatewayIPService From this window you can configure an IP gateway. See the Tivoli Assistant online help system for step-by-step instructions on how to accomplish these tasks. Managing SNMP Device Configuration You can configure SNMP device information, such as read and write community names, SNMP port number, retry counters, and timeout thresholds. The information, which is stored as configuration data and is used when establishing sessions with SNMP agents, can be configured for a single resource, a group of resources, or an entire subnet, based on the network address specified. You can also create and associate SNMP configurations with a network address translation (NAT). A NAT represents a namespace within which IP addresses are unique. By creating a NAT, you can partition the installation into private IP network namespaces to ensure a unique destination for data sent to an IP address that might exist in more than one IP network namespace. Before the SNMP configuration GUI views can be used, you must deploy the IpConfigImpl service to either orb.1 or orb.2. To deploy the service from the command line, use the following command, where orb_oid and orbset_oid represent the object identifier of the ORB or ORB set to which you want to deploy the service: wcmd cds deploy IpConfigImpl@5.2.0 {orb_oid orbset_oid} For example: wcmd cds deploy IpConfigImpl@ d3b096df447cef5f.1.2c27b7076f1e5965 Note: This deploy command must be issued from orb.1. To view and configure SNMP device information, select the View SNMP Configuration task in the Administer Management Software task group in the portfolio. The View SNMP Device Configuration window, shown in Figure 26 on page 41, displays the configuration information in a tree structure organized by NAT. 40 Version 1.2

55 5. Administer Management Software Figure 26. View SNMP Device Configuration window From this window you can create new NATs, manage default SNMP device configuration for a NAT, and manage SNMP device configuration for individual IP addresses or a range of IP addresses. See the Tivoli Assistant online help topics for step-by-step instructions on how to accomplish these tasks. Introducing Tivoli Kernel Services 41

56 42 Version 1.2

57 A System-Defined Roles A number of security roles have been defined in Tivoli Kernel Services for your use. These roles have a predefined set of access conditions and are provided to help you grant users the proper system access. These roles can be copied or modified to meet your needs. Several roles are used internally by Tivoli Kernel Services and should not be modified. The following tables list and describe all system roles. The roles are divided into the various directory paths where they exist within the security registry. Table 6. Roles located in the Applications/ directory of the security registry Applications/ TES/01/roles/MetaTESAdmin Administrator role for MetaTES resource. Table 7. Roles located in the PS/PSServer/Roles/ directory of the security registry PS/PSServer/Roles/ com.tivoli.pf.pfconsole.impl/1.2.0/consoleusers Base role that is automatically assigned to any user in the security registry. Provides access to sign on to the Tivoli Console. com.tivoli.pf.pfconsole.impl/1.2.0/mcfulrole Base role that is automatically assigned to any user in the security registry. Provides access to users to perform tasks in the Tivoli Console. MACImpl/5.2.0/MACInstallUser Role that allows users to perform all system administration functions. Provides access to all tasks within all task groups. MACImpl/5.2.0/MACLimitedSecurityUser Role that allows users to view security information for the user and account you signed on to the console with, and search for security resources. Provides access to View User Properties and Search Security tasks within the Administer Security task group. MACImpl/5.2.0/MACLoggingUser Role that allows users to perform logging administration functions. Provides access to all tasks within the Administer Logging task group. MACImpl/5.2.0/MACOrbUser Role that allows users to perform ORB, ORB set, component, and data connection administration functions. Provides access to Manage ORBs, View Data Connections, and View SNMP Configuration tasks. A. System-Defined Roles Introducing Tivoli Kernel Services 43

58 Table 7. Roles located in the PS/PSServer/Roles/ directory of the security registry (continued) PS/PSServer/Roles/ MACImpl/5.2.0/MACResourceUser Role that allows users to perform directory administration functions. Provides access to the View Directory task. MACImpl/5.2.0/MACSecurityUser Role that allows users to perform security administration functions. Provides access to all tasks within the Administer Security task group. MACImpl/5.2.0/MACSeniorUser Role that allows users to perform all system administration functions. Provides access to all tasks within all task groups. Table 8. Roles located in the security/roles/ directory of the security registry security/roles/ Administrator Role that provides full access to all objects in the security registry. User Administrator Role that grants authority to work with accounts and persons only, does not have authority to work with roles. Can add, delete, and edit accounts and persons anywhere in the security registry with the exception of the security directory. Does not have the authority to use the security CLI commands. wcmdrole Role that grants access to all security CLI commands. Should only be assigned to your super administrators. Table 9. Roles located in the system/roles/ directory of the security registry system/roles/ Bootprint Installer Role that provides access to install bootprints. Database Admin Role that provides access to work with all SimpleDataSource objects in the system directory of the security registry. Logging Administrator Role that grants authority to manage loggers, handlers, and filters (masks). System Administrator Role that provides end-user access to all Tivoli Kernel Services except for the security registry. Provides access to all CLI commands except for security commands. View Application Data Role that provides access to view all security registry objects in the application directory of the security registry. View System Data Role that provides access to view all security registry objects in the system directory of the security registry. 44 Version 1.2

59 Table 10. Roles located in the system/services/roles/ directory of the security registry system/services/roles/ CfgUsingDirectory Internal-use-only role used by the configuration service. Do not edit, delete, or assign this role. DirectoryService Role that grants full access to the Directory Service. Do not delete this role as it is used by internal services. gateway/jrdeviceadmin Role that grants deviceexe access to the device groups that a security registry administrator configures as targets. gateway/deviceadmin Role that grants deviceread and deviceexe access to the device groups that a security registry administrator configures as targets. gateway/srdeviceadmin Role that grants deviceread, devicewrite, and deviceexe access to the device groups that a security registry administrator configures as targets. gateway/superdeviceadmin Role that grants deviceread, devicewrite, and deviceexe access to all devices. gateway/jrgatewayadmin Role that grants read access to the Gateway instances that a security registry administrator configures as targets. gateway/gatewayadmin Role that grants read and execute access to the Gateway instances that a security registry administrator configures as targets. gateway/srgatewayadmin Role that grants read, write, and execute access to the Gateway instances that a security registry administrator gateway/supergatewayadmin Role that grants read, write, and execute access to all Gateway instances. KernelService Internal-use-only role for Tivoli Kernel Services. Do not modify or delete this role. nels/jrnelsadmin Role that grants read access to the NEL Service instances that a security registry administrator configures as targets. nels/nelsadmin Role that grants read and execute access to the NEL Service instances that a security registry administrator configures as targets. nels/srnelsadmin Role that grants read, write, and execute access to the NEL Service instances that a security registry administrator configures as targets. nels/supernelsadmin Role that grants read, write, and execute access to the NEL Service instances. A. System-Defined Roles Introducing Tivoli Kernel Services 45

60 46 Version 1.2

61 B Using the NEL Service and Gateway in a Secure Environment The Network Endpoint Locator (NEL) Service and Gateway components are designed to support a multi-customer environment, while protecting individual network devices from access by unauthorized parties. Each object in the path to accessing a network device the NEL Service, the Gateway, and the device itself is subject to authorization checks. Therefore, a user trying to access a given device must be authorized to access three things: (1) the NEL Service that locates the Gateway to the device, (2) the Gateway to the device and (3) the device (endpoint). The user gains access rights by authenticating as a principal in the security registry, which has been configured to have the required access conditions. Accessing a NEL Service Instance There are objects in the security registry that represent each individual NEL Service instance in a Tivoli Kernel Services installation. The NEL Service objects have the following names, where orbname is in the format machine_port. system/services/nels/nels_orbname In addition, there is an object that represents all NEL Service instances. This NEL Service object has the following name: system/services/nels/nels There are three access rights associated with a NEL Service object: read, write, and execute. One of these rights is needed when performing a NEL Service action. For example, to display the names of network address translations (NATs) in the installation, the user must have read access to the NEL Service instance and to resolve an endpoint using configuration data, the user must have execute access. The security registry contains predefined roles with specific access rights. The predefined roles for NEL Service access are as follows: system/services/roles/nels/supernelsadmin This role has read, write, and execute access to all NEL Service instances. system/services/roles/nels/srnelsadmin This role has read, write, and execute access to the NEL Service instances that a security administrator configures as targets. system/services/roles/nels/nelsadmin This role has read and execute access to the NEL Service instances that a security administrator configures as targets. B. Security for NEL Service and Gateway Introducing Tivoli Kernel Services 47

62 system/services/roles/nels/jrnelsadmin This role has read access to the NEL Service instances that a security administrator configures as targets. In addition, the system/services/roles/kernelservice role has read, write, and execute rights to all NEL Service instances. The SuperNELSAdmin role applies to the overall NEL Service object, which means that the access applies to all NEL Service instances. However, most of the roles do not have any target object defined and the security administrator must configure which NEL Service instances the roles apply to. To configure a target for a role, the administrator must associate a securable object with a capability within the role. The predefined NEL Service roles that require a target to be configured have the following capabilities: SuperNELSAdmin has system/services/roles/nels/supernelsadmin/supernelscapability capability. SrNELSAdmin has system/services/roles/nels/srnelsadmin/srnelscapability capability. NELSAdmin has system/services/roles/nels/nelsadmin/nelscapability capability. JrNELSAdmin has system/services/roles/nels/jrnelsadmin/jrnelscapability capability. Note: Before attaching static targets to a role, it is recommended that you create a new role by cloning, or copying and renaming, the predefined role. As an example, suppose you want to configure a role that has read, write, and execute access to the NEL Service instance running on machine sys1, port The NEL Service object in the security registry would be named system/services/nels/nels_sys1_9990 and the applicable role would be SrNELSAdmin because it has read, write, and execute access. To associate the desired target with the capability in the role: 1. From the portfolio, select the Administer Security View Users, Resources, Roles. 48 Version 1.2

63 2. In the Security Registry window, double-click system services roles nels to display the predefined NEL Service roles. 3. Copy and rename the SrNELSAdmin role as described in Copying Objects in the Security Registry on page 25. In this example, the new role is renamed SrNELSAdmin1. 4. To edit the newly created role, double click the role. 5. In the Role Properties window, select SrNELSCapability (from the Capabilities table) and click Edit. B. Security for NEL Service and Gateway Introducing Tivoli Kernel Services 49

64 6. In the Capability window, select Static Targets and click New. 7. In the Select Members window: a. Select Full name from the Property drop-down list and type the resource name, for example NELS_sys1_9990, in the text box. b. Click Run to locate the resource. (When the resource is located, it is displayed in the bottom half of the window.) c. Select the resource and click OK to add it to the list of static targets. 8. In the Capability window, click OK to save the changes. You can also use the wcmd ssm interface to associate the desired target with the capability in the role as follows: 50 Version 1.2

65 wcmd ssm modifyattributes -p system/services/roles/nels/srnelsadmin/srnelscapability -op add statictarget=system/services/nels/nels_sys1_9990 Roles only become useful when they are assigned to security principals. A person can then sign on as the principal and gain the accesses of any roles the principal has. Principals are objects within the security registry and can be created by installation security administrators as needed. Assume that the principal User1 has been created with the following path in the registry: applications/test/principals/user1 To assign a role to a principal, you can use either the procedure outlined in Assigning Roles to a User on page 18 or the wcmd ssm command line interface as follows: wcmd ssm modifyattributes -p applications/test/principals/user1 -op add staticrole=system/services/roles/nels/srnelsadmin Users that sign on as the User1 principal would then have read, right, and execute access to the NEL Service service running on sys1. Accessing a Gateway Instance The security aspects of the Gateway service are analogous to those of the NEL Service. There are objects in the security registry that represent each individual Gateway instance in a Tivoli Kernel Services installation. The Gateway objects have the following names, where type is either SNMP or IP and orbname is in the format machine_port. system/services/gateway/gatewaytype_orbname In addition, there is an object that represents all Gateway instances. This Gateway object has the following name: system/services/gateway/gateway There are three access rights associated with a Gateway object: read, write, and execute. One of these rights is required when performing any Gateway action. For example, to get the status of the Gateway service, the user must have read access to the Gateway instance. The security registry contains predefined roles with specific access rights. The predefined roles for Gateway access are as follows: system/services/roles/gateway/supergatewayadmin This role has read, write, and execute access to all Gateway instances. system/services/roles/gateway/srgatewayadmin This role has read, write, and execute access to the Gateway instances that a security administrator configures as targets. system/services/roles/gateway/gatewayadmin This role has read and execute access to the Gateway instances that a security administrator configures as targets. system/services/roles/gateway/jrgatewayadmin This role has read access to the Gateway instances that a security administrator configures as targets. B. Security for NEL Service and Gateway Introducing Tivoli Kernel Services 51

66 In addition, the system/services/roles/kernelservice role has read, write, and execute rights to all Gateway instances. The SuperGatewayAdmin role applies to the overall Gateway object, which means that the access applies to all Gateway instances. However, most of the roles do not have any target object defined and the security administrator must configure which Gateway instances the roles apply to. To configure a target for a role, the administrator must associate a securable object with a capability within the role. The predefined Gateway roles that require a target to be configured have the following capabilities: SuperGatewayAdmin has system/services/roles/gateway/supergatewayadmin/supergatewaycapability capability. SrGatewayAdmin has system/services/roles/gateway/srgatewayadmin/srgatewaycapability capability. GatewayAdmin has system/services/roles/gateway/gatewayadmin/gatewaycapability capability. JrGatewayAdmin has system/services/roles/gateway/jrgatewayadmin/jrgatewaycapabilit capability. Note: Before attaching static targets to a role, it is recommended that you create a new role by cloning, or copying and renaming, the predefined role. As an example, suppose you want to configure a role that has read access only to the GatewayIP instance running on machine sys1, port The Gateway object in the security registry would be named system/services/gateway/gatewayip_sys1_9990 and the applicable role would be JrGatewayAdmin because it has read access only. To associate the desired target with the capability in the role: 1. From the portfolio, select the Administer Security View Users, Resources, Roles. 52 Version 1.2

67 2. In the Security Registry window, double-click system services roles gateway to display the predefined Gateway roles. 3. Copy and rename the JrGatewayAdmin role as described in Copying Objects in the Security Registry on page 25. In this example, the new role is renamed JrGatewayAdmin1. 4. To edit the newly created role, double click the role. 5. In the Role Properties window, select JrGatewayCapability (from the Capabilities table) and click Edit. B. Security for NEL Service and Gateway Introducing Tivoli Kernel Services 53

Preface. Audience. Cisco IOS Software Documentation. Organization

Preface. Audience. Cisco IOS Software Documentation. Organization This preface describes the audience, organization, and conventions of this publication, and provides information on how to obtain related documentation. Cisco documentation and additional literature are

More information

Open Source Used In TSP

Open Source Used In TSP Open Source Used In TSP 3.5.11 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.

More information

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2 Documentation Roadmap for Cisco Prime LAN Thank you for purchasing Cisco Prime LAN Management Solution (LMS) 4.2. This document provides an introduction to the Cisco Prime LMS and lists the contents of

More information

Tivoli SecureWay Policy Director WebSEAL. Installation Guide. Version 3.8

Tivoli SecureWay Policy Director WebSEAL. Installation Guide. Version 3.8 Tivoli SecureWay Policy Director WebSEAL Installation Guide Version 3.8 Tivoli SecureWay Policy Director WebSEAL Installation Guide Version 3.8 Tivoli SecureWay Policy Director WebSEAL Installation Guide

More information

PageScope Box Operator Ver. 3.2 User s Guide

PageScope Box Operator Ver. 3.2 User s Guide PageScope Box Operator Ver. 3.2 User s Guide Box Operator Contents 1 Introduction 1.1 System requirements...1-1 1.2 Restrictions...1-1 2 Installing Box Operator 2.1 Installation procedure...2-1 To install

More information

About This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010

About This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010 This guide describes how to use Cisco Network Analysis Module Traffic Analyzer 4.2 (NAM 4.2) software. This preface has the following sections: Chapter Overview, page xvi Audience, page xvii Conventions,

More information

MagicInfo Express Content Creator

MagicInfo Express Content Creator MagicInfo Express Content Creator MagicInfo Express Content Creator User Guide MagicInfo Express Content Creator is a program that allows you to conveniently create LFD content using a variety of templates.

More information

Tivoli Distributed Monitoring for Active Directory Release Notes. Version 3.7

Tivoli Distributed Monitoring for Active Directory Release Notes. Version 3.7 Tivoli Distributed Monitoring for Active Directory Release Notes Version 3.7 Tivoli Distributed Monitoring for Active Directory Release Notes Version 3.7 Tivoli Distributed Monitoring for Active Directory

More information

TWAIN driver User s Guide

TWAIN driver User s Guide 4037-9571-05 TWAIN driver User s Guide Contents 1 Introduction 1.1 System requirements...1-1 2 Installing the TWAIN Driver 2.1 Installation procedure...2-1 To install the software...2-1 2.2 Uninstalling...2-1

More information

Tivoli Management Solution for Domino. Installation and Setup Guide. Version GC

Tivoli Management Solution for Domino. Installation and Setup Guide. Version GC Tivoli Management Solution for Domino Installation and Setup Guide Version 3.2.0 GC32-0755-00 Tivoli Management Solution for Domino Installation and Setup Guide Version 3.2.0 GC32-0755-00 Tivoli Management

More information

Tivoli SecureWay Policy Director Management Console for Windows Administration Guide Version 3.7

Tivoli SecureWay Policy Director Management Console for Windows Administration Guide Version 3.7 Tivoli SecureWay Policy Director Management Console for Windows Administration Guide Version 3.7 January 2001 Tivoli SecureWay Policy Director Management Console for Windows Administration Guide Copyright

More information

SkyPilot OS Installation: Fedora Core 5

SkyPilot OS Installation: Fedora Core 5 SkyPilot OS Installation: Fedora Core 5 PN 671-00024-01 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose.

More information

TheGreenBow VPN Client ios User Guide

TheGreenBow VPN Client ios User Guide www.thegreenbow.com TheGreenBow VPN Client ios User Guide Property of TheGreenBow 2018 Table of Contents 1 Presentation... 3 1.1 TheGreenBow VPN Client... 3 1.2 TheGreenBow VPN Client main features...

More information

Tivoli SecureWay Policy Director Authorization ADK. Developer Reference. Version 3.8

Tivoli SecureWay Policy Director Authorization ADK. Developer Reference. Version 3.8 Tivoli SecureWay Policy Director Authorization ADK Developer Reference Version 3.8 Tivoli SecureWay Policy Director Authorization ADK Developer Reference Version 3.8 Tivoli SecureWay Policy Director Authorization

More information

Event Server Configuration Manager

Event Server Configuration Manager Tivoli Management Solution for Microsoft SQL Event Server Configuration Manager Version 1.1 Tivoli Management Solution for Microsoft SQL Event Server Configuration Manager Version 1.1 Tivoli Management

More information

Troubleshoot TEMS Communication Problems in Multiple TCP/IP Stacks Environments

Troubleshoot TEMS Communication Problems in Multiple TCP/IP Stacks Environments Troubleshoot TEMS Communication Problems in Multiple TCP/IP Stacks Environments By Nicola Catrambone and Francesco Marinucci Version 1.0 Copyright Notice Copyright IBM Corporation 2010. All rights reserved.

More information

Configuration Manager

Configuration Manager Tivoli Management Solution for Microsoft SQL Configuration Manager Version 1.1 Tivoli Management Solution for Microsoft SQL Configuration Manager Version 1.1 Tivoli Management Solution for Microsoft SQL

More information

Tivoli Management Solution for Microsoft SQL. Statistics Builder. Version 1.1

Tivoli Management Solution for Microsoft SQL. Statistics Builder. Version 1.1 Tivoli Management Solution for Microsoft SQL Statistics Builder Version 1.1 Tivoli Management Solution for Microsoft SQL Statistics Builder Version 1.1 Tivoli Management Solution for Microsoft SQL Copyright

More information

Tivoli Policy Director for MQSeries Version 3.8. GuidetoGlobalSecurityToolkit(GSKIT) Messages 3.8 GC

Tivoli Policy Director for MQSeries Version 3.8. GuidetoGlobalSecurityToolkit(GSKIT) Messages 3.8 GC Tivoli Policy Director for MQSeries Version 3.8 GuidetoGlobalSecurityToolkit(GSKIT) Messages 3.8 GC32-0817-00 Tivoli Policy Director for MQSeries Guide to Global Security Toolkit Messages Copyright Notice

More information

SkyPilot EMS Installation

SkyPilot EMS Installation SkyPilot EMS Installation 671-00004-01 Rev B 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose. Product

More information

Tivoli Web Solutions. Upgrade Notes

Tivoli Web Solutions. Upgrade Notes Tivoli Web Solutions Upgrade Notes Tivoli Web Solutions Upgrade Notes Note Before using this information and the product it supports, read the information in Notices on page 7. IBM Tivoli Web Solutions

More information

IBM Tivoli Management Solution for Exchange. User s Guide. Version 1.1 GC

IBM Tivoli Management Solution for Exchange. User s Guide. Version 1.1 GC IBM Tivoli Management Solution for Exchange User s Guide Version 1.1 GC23-4721-00 IBM Tivoli Management Solution for Exchange User s Guide Version 1.1 GC23-4721-00 IBM Tivoli Management Solution for Exchange

More information

Tivoli SecureWay Policy Director Authorization ADK Developer Reference Version 3.7

Tivoli SecureWay Policy Director Authorization ADK Developer Reference Version 3.7 Tivoli SecureWay Policy Director Authorization ADK Developer Reference Version 3.7 January 2001 Tivoli SecureWay Policy Director Authorization ADK Developer Reference Copyright Notice Copyright IBM Corporation

More information

Supported and Interoperable Devices and Softwares for the Cisco Secure Access Control System 5.2

Supported and Interoperable Devices and Softwares for the Cisco Secure Access Control System 5.2 Supported and Interoperable Devices and Softwares for the Cisco Secure Access Control System 5.2 Revised: March 11, 2013 The Cisco Secure Access Control System Release 5.2, hereafter referred to as ACS,

More information

Reporting and Graphing

Reporting and Graphing Tivoli Management Solution for Microsoft SQL Reporting and Graphing Version 1.1 Tivoli Management Solution for Microsoft SQL Reporting and Graphing Version 1.1 Tivoli Management Solution for Microsoft

More information

Supported and Interoperable Devices and Software for Cisco Secure Access Control System 5.4

Supported and Interoperable Devices and Software for Cisco Secure Access Control System 5.4 Supported and Interoperable Devices and Software for Cisco Secure Access Control System 5.4 Revised: January 30, 2014 The Cisco Secure Access Control System Release 5.4, hereafter referred to as ACS, works

More information

Tivoli Management Framework User s Guide Version 3.7.1

Tivoli Management Framework User s Guide Version 3.7.1 Tivoli Management Framework User s Guide Version 3.7.1 Tivoli Management Framework User s Guide Copyright Notice Copyright IBM Corporation 1998, 2001. All rights reserved. May only be used pursuant to

More information

Tivoli Manager for R/3** User s Guide Version 2.1

Tivoli Manager for R/3** User s Guide Version 2.1 Tivoli Manager for R/3** User s Guide Version 2.1 Tivoli Manager for R/3** User s Guide Version 2.1 Tivoli Manager for R/3 User s Guide (September 2000) Copyright Notice Copyright 1997, 2000 by Tivoli

More information

DAP Controller FCO

DAP Controller FCO Release Note DAP Controller 6.61.0790 System : Business Mobility IP DECT Date : 20 December 2017 Category : General Release Product Identity : DAP Controller 6.61.0790 Queries concerning this document

More information

Tivoli Management Solution for Microsoft SQL. Troubleshooting. Version 1.1

Tivoli Management Solution for Microsoft SQL. Troubleshooting. Version 1.1 Tivoli Management Solution for Microsoft SQL Troubleshooting Version 1.1 Tivoli Management Solution for Microsoft SQL Troubleshooting Version 1.1 Tivoli Management Solution for Microsoft SQL Copyright

More information

DAP Controller FCO

DAP Controller FCO Release Note DAP Controller 6.40.0412 FCO 2016.046 System : Business Mobility IP DECT Date : 30 June 2016 Category : Maintenance Product Identity : DAP Controller 6.40.0412 Queries concerning this document

More information

This section describes new Polycom QDX 6000 hardware.

This section describes new Polycom QDX 6000 hardware. PLEASE NOTE 4.0.1 UPGRADE DEPENDENCY: Customers who used data pass through in 4.0 will need to use a new cable after the upgrade. The part number for the new Data Pass-Through cable is 2457-32892-001.

More information

Tivoli Module Builder TivoliReadyQuickStartUser sguide Version 2.4

Tivoli Module Builder TivoliReadyQuickStartUser sguide Version 2.4 Tivoli Module Builder TivoliReadyQuickStartUser sguide Version 2.4 Tivoli Module Builder TivoliReadyQuickStartUser sguide Version 2.4 Tivoli Module Builder QuickStart User s Guide Copyright Notice Copyright

More information

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Service Data Objects (SDO) DFED Sample Application README Copyright IBM Corporation, 2012, 2013 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract

More information

Tivoli Management Solution for Microsoft SQL. Rule Designer. Version 1.1

Tivoli Management Solution for Microsoft SQL. Rule Designer. Version 1.1 Tivoli Management Solution for Microsoft SQL Rule Designer Version 1.1 Tivoli Management Solution for Microsoft SQL Rule Designer Version 1.1 Tivoli Management Solution for Microsoft SQL Copyright Notice

More information

Using Client Security with Policy Director

Using Client Security with Policy Director IBM Client Security Solutions Using Client Security with Policy Director Client Security Software Version 1.2 June 2000 1 Before using this information and the product it supports, be sure to read Appendix

More information

Introduction. The Win32 OpenSSL Installation Group hopes that you enjoy this software and get many years of use out of it!

Introduction. The Win32 OpenSSL Installation Group hopes that you enjoy this software and get many years of use out of it! Introduction Welcome to the Win32 OpenSSL Installation Project. This project is designed to make it easy for Windows developers to get OpenSSL binaries (DLLs) installed and enable programmers to quickly

More information

TME 10 Reporter Release Notes

TME 10 Reporter Release Notes TME 10 Reporter Release Notes Version 2.0 April, 1997 TME 10 Reporter (April 1997) Copyright Notice Copyright 1991, 1997 by Tivoli Systems, an IBM Company, including this documentation and all software.

More information

IBM Tivoli Federated Identity Manager Version Installation Guide GC

IBM Tivoli Federated Identity Manager Version Installation Guide GC IBM Tivoli Federated Identity Manager Version 6.2.2 Installation Guide GC27-2718-01 IBM Tivoli Federated Identity Manager Version 6.2.2 Installation Guide GC27-2718-01 Note Before using this information

More information

Crypto Application. version 1.2

Crypto Application. version 1.2 Crypto Application version 1.2 The Erlang/OTP SSL application includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). Copyright (c) 1998-2002 The OpenSSL

More information

Tivoli Management Solution for Microsoft SQL. Release Notes. Version 1.1

Tivoli Management Solution for Microsoft SQL. Release Notes. Version 1.1 Tivoli Management Solution for Microsoft SQL Release Notes Version 1.1 Tivoli Management Solution for Microsoft SQL Release Notes Version 1.1 Tivoli Management Solution for Microsoft SQL Copyright Notice

More information

Tivoli Policy Director for WebLogic Server

Tivoli Policy Director for WebLogic Server Tivoli Policy Director for WebLogic Server User Guide Version 3.8 SC32-0831-00 Tivoli Policy Director for WebLogic Server User Guide Version 3.8 SC32-0831-00 Tivoli SecureWay Policy Director for WebLogic

More information

Tivoli SecureWay User Administration. LDAPConnectionUser sguide. Version 3.8

Tivoli SecureWay User Administration. LDAPConnectionUser sguide. Version 3.8 Tivoli SecureWay User Administration LDAPConnectionUser sguide Version 3.8 Tivoli SecureWay User Administration LDAPConnectionUser sguide Version 3.8 Tivoli SecureWay User Administration LDAP Connection

More information

Novell Audit 2.0 Administration Guide. novdocx (ENU) 10 August Novell Audit ADMINISTRATION GUIDE.

Novell Audit 2.0 Administration Guide. novdocx (ENU) 10 August Novell Audit ADMINISTRATION GUIDE. Novell Audit 2.0 Administration Guide Novell Audit 2.0 July 14, 2006 ADMINISTRATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or

More information

Tivoli SecureWay Policy Director Authorization API Java Wrappers Developer Reference Version 3.7

Tivoli SecureWay Policy Director Authorization API Java Wrappers Developer Reference Version 3.7 Tivoli SecureWay Policy Director Authorization API Java Wrappers Developer Reference Version 3.7 January 2001 Tivoli SecureWay Policy Director Authorization API Java Wrappers Developer Reference Copyright

More information

IBM White Paper: IBM Maximo 7.1 Integration Framework Configuration Basics

IBM White Paper: IBM Maximo 7.1 Integration Framework Configuration Basics IBM White Paper: IBM Maximo 7.1 Integration Framework Configuration Basics White Paper Barbara Vander Weele (bcvander@us.ibm.com) July 2008 Copyright Notice Copyright 2008 IBM Corporation, including this

More information

Fiery PRO 80 /S450 65C-KM

Fiery PRO 80 /S450 65C-KM Fiery PRO 80 /S450 65C-KM Network Scanner/Web Connection Chapter 1: Introduction Chapter 2: Overview of the Scanning Features Chapter 3: Registration of the destination Chapter 4: Transmission to the registered

More information

Fiery S450 65C-KM. Network Scanner

Fiery S450 65C-KM. Network Scanner Fiery S450 65C-KM Network Scanner Chapter 1: Introduction Chapter 2: Overview of the Scanning Features Chapter 3: Registration of the destination Chapter 4: Transmission to the registered destination Chapter

More information

Installation Guide. Tivoli Decision Support 2.0

Installation Guide. Tivoli Decision Support 2.0 Installation Guide Tivoli Decision Support 2.0 Tivoli Decision Support 2.0 Installation Guide (August, 1998) Copyright 1998 by Tivoli Systems, an IBM Company, including this documentation and all software.

More information

JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference

JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference JP1 Version 11 JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference 3021-3-B25-20(E) Notices Relevant program products For details about the applicable

More information

Bar Code Discovery. Administrator's Guide

Bar Code Discovery. Administrator's Guide Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4

More information

Tivoli Management Framework User s Guide. Version 3.7

Tivoli Management Framework User s Guide. Version 3.7 Tivoli Management Framework User s Guide Version 3.7 Tivoli Management Framework User s Guide (August 2000) Copyright Notice Copyright 1998, 2000 by Tivoli Systems Inc., an IBM Company, including this

More information

Tivoli Storage Manager version 6.3 Effective Chargeback Practices using Reporting/Monitoring

Tivoli Storage Manager version 6.3 Effective Chargeback Practices using Reporting/Monitoring Tivoli Storage Manager version 6.3 Effective Chargeback Practices using Reporting/Monitoring By Bill Komanetsky Version 1.0 Copyright Notice Copyright IBM Corporation 2005. All rights reserved. May only

More information

TME 10 Module For Oracle** - User Management User s Guide. Version 1.0

TME 10 Module For Oracle** - User Management User s Guide. Version 1.0 TME 10 Module For Oracle** - User Management User s Guide Version 1.0 TME 10 Module For Oracle - User Management User s Guide (November 1997) Copyright Notice Copyright 1997 by Tivoli Systems, an IBM

More information

JD Edwards World Quick Installation Guide. Version A9.2 Update 1

JD Edwards World Quick Installation Guide. Version A9.2 Update 1 JD Edwards World Quick Installation Guide Version A9.2 Update 1 Revised August 11, 2010 Copyright Notice Copyright 2009, Oracle. All rights reserved. Trademark Notice Oracle is a registered trademark of

More information

Conettix Universal Dual Path Communicator B465

Conettix Universal Dual Path Communicator B465 Conettix Universal Dual Path Communicator B465 en Release Notes Conettix Universal Dual Path Communicator Table of contents en 3 Table of contents 1 Introduction 4 1.1 Requirements 4 2 Version 2.00.000

More information

Mid-Level Manager User s Guide

Mid-Level Manager User s Guide NetView for UNIX Mid-Level Manager User s Guide Version 7 SC31-8887-00 Tivoli NetView Mid-Level Manager User s Guide Copyright Notice Copyright IBM Corporation 2001. All rights reserved. May only be used

More information

Tivoli Decision Support 2.1

Tivoli Decision Support 2.1 ,QVWDOODWLRQ*XLGH Tivoli Decision Support 2.1 Tivoli Decision Support 2.1 Installation Guide (October 1999) Copyright 1999 by Tivoli Systems, an IBM Company, including this documentation and all software.

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

im2020, im2520, im2520f, im Printer Management Utility

im2020, im2520, im2520f, im Printer Management Utility 4514-775-04 Printer Management Utility Contents im2020, im2520, im2520f, im520 Contents 1 Introduction 1.1 Welcome...1-1 Trademark Acknowledgements...1-1 OpenSSL Statement...1-2 1.2 System Requirements...1-5

More information

Release Notes. Polycom QDX 6000 Introduction. Polycom QDX 6000, Version 3.0

Release Notes. Polycom QDX 6000 Introduction. Polycom QDX 6000, Version 3.0 Polycom QDX 6000, Version 3.0 Polycom is pleased to announce the initial release of Polycom QDX 6000 hardware and software. This document provides information about the Polycom QDX 6000 system and version

More information

IBM Tivoli Monitoring for Web Infrastructure: WebSphere Application Server. User s Guide. Version SC

IBM Tivoli Monitoring for Web Infrastructure: WebSphere Application Server. User s Guide. Version SC IBM Tivoli Monitoring for Web Infrastructure: WebSphere Application Server User s Guide Version 5.1.1 SC23-4705-01 IBM Tivoli Monitoring for Web Infrastructure: WebSphere Application Server User s Guide

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

Navigation Guide for Cisco Prime LAN Management Solution 4.2

Navigation Guide for Cisco Prime LAN Management Solution 4.2 Navigation Guide for Cisco Prime LAN Management Solution 4.2 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Version 9 Release 0. IBM i2 Analyst's Notebook Premium Configuration IBM

Version 9 Release 0. IBM i2 Analyst's Notebook Premium Configuration IBM Version 9 Release 0 IBM i2 Analyst's Notebook Premium Configuration IBM Note Before using this information and the product it supports, read the information in Notices on page 11. This edition applies

More information

SkyPilot Web Interface Reference

SkyPilot Web Interface Reference SkyPilot Web Interface Reference 671-00011-01 Rev B 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose.

More information

Navigation Guide for Cisco Prime LAN Management Solution 4.1

Navigation Guide for Cisco Prime LAN Management Solution 4.1 Navigation Guide for Cisco Prime LAN Management Solution 4.1 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

JD Edwards World User Reserved Information. Version A9.2

JD Edwards World User Reserved Information. Version A9.2 JD Edwards World User Reserved Information Version A9.2 Revised June 30, 2009 Copyright Notice Copyright 2009, Oracle. All rights reserved. Trademark Notice Oracle is a registered trademark of Oracle Corporation

More information

JD Edwards EnterpriseOne Date Utility

JD Edwards EnterpriseOne Date Utility JD Edwards EnterpriseOne Date Utility June 2010 JD Edwards EnterpriseOne Date Utility Releases Xe thru 9.0 Copyright Notice Copyright 2010, Oracle and/or its affiliates. All rights reserved. Trademark

More information

QuarkXPress Server Manager 8.0 ReadMe

QuarkXPress Server Manager 8.0 ReadMe QuarkXPress Server Manager 8.0 ReadMe CONTENTS Contents QuarkXPress Server Manager 8.0 ReadMe...3 What's New in QuarkXPress Server Manager 8...4 Deprecated features, new stubs, and deploying SDK classes...4

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

Oracle Auto Service Request

Oracle Auto Service Request Oracle Auto Service Request Exadata Database Machine Quick Installation Guide Release 4.5 E23333-07 July 2013 Oracle Auto Service Request (ASR) is a secure, scalable, customer-installable software feature

More information

Version 9 Release 0. IBM i2 Analyst's Notebook Configuration IBM

Version 9 Release 0. IBM i2 Analyst's Notebook Configuration IBM Version 9 Release 0 IBM i2 Analyst's Notebook Configuration IBM Note Before using this information and the product it supports, read the information in Notices on page 11. This edition applies to version

More information

StorageGRID Webscale NAS Bridge Management API Guide

StorageGRID Webscale NAS Bridge Management API Guide StorageGRID Webscale NAS Bridge 2.0.3 Management API Guide January 2018 215-12414_B0 doccomments@netapp.com Table of Contents 3 Contents Understanding the NAS Bridge management API... 4 RESTful web services

More information

Carbonite Server Backup Portal 8.5. Administration Guide

Carbonite Server Backup Portal 8.5. Administration Guide Carbonite Server Backup Portal 8.5 Administration Guide 2018 Carbonite, Inc. All rights reserved. Carbonite makes no representations or warranties with respect to the contents hereof and specifically disclaims

More information

User Management Guide

User Management Guide IBM Tivoli Monitoring for Databases: Oracle User Management Guide Version 5.1.0 GC23-4731-00 IBM Tivoli Monitoring for Databases: Oracle User Management Guide Version 5.1.0 GC23-4731-00 Note Before using

More information

Getting Started with Automatic Provisioning

Getting Started with Automatic Provisioning Getting Started with Automatic Provisioning PN 671-00024-01 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any

More information

JD Edwards World EDI Error Notification. Version A9.2

JD Edwards World EDI Error Notification. Version A9.2 JD Edwards World EDI Error Notification Version A9.2 Revised June 8, 2009 Copyright Notice Copyright 2009, Oracle. All rights reserved. Trademark Notice Oracle is a registered trademark of Oracle Corporation

More information

Tivoli Access Manager for Enterprise Single Sign-On

Tivoli Access Manager for Enterprise Single Sign-On Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Installation and Setup Guide GC23-6349-03 Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Installation and Setup Guide GC23-6349-03

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Product version: 10.2 Document date: September 2012 Contents 1 Before you begin...3 2 Install Sophos Endpoint Security and Control...4 3 Configure

More information

HYCU SCOM Management Pack for F5 BIG-IP

HYCU SCOM Management Pack for F5 BIG-IP USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.5 Product release date: August 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This

More information

Tivoli Manager for Exchange User s Guide. Version 2.0

Tivoli Manager for Exchange User s Guide. Version 2.0 Tivoli Manager for Exchange User s Guide Version 2.0 Tivoli Manager for Exchange User s Guide (December 1999) Copyright Notice Copyright 1998, 1999 by Tivoli Systems, an IBM Company, including this

More information

EVault Software Agent for VMware 6.91 Quick Start Guide

EVault Software Agent for VMware 6.91 Quick Start Guide EVault Software Agent for VMware 6.91 Quick Start Guide Contents 1 Overview... 4 2 Deploying the OVF Template via the OVA File... 4 3 Setting Up the Agent... 5 3.1 Starting the Appliance Shell (CLI)...

More information

Release 3.7 January 2018 User Guide

Release 3.7 January 2018 User Guide Release 3.7 January 2018 User Guide ABILITY Network Inc Copyright and Trademark Copyright Copyright 2018 ABILITY Network Inc. All Rights Reserved. All text, images, and graphics, and other materials in

More information

TME 10 Software Distribution AutoPack User s Guide. Version 3.6

TME 10 Software Distribution AutoPack User s Guide. Version 3.6 TME 10 Software Distribution AutoPack User s Guide Version 3.6 September 1998 TME 10 Software Distribution AutoPack User s Guide (September 1998) Copyright Notice Copyright 1998 by Tivoli Systems, an

More information

Program Directory for Tivoli Workload Scheduler. Version 8 Release 1, Modification Level 0. Program Number 5698-WKB. for Use with OS/390 z/os

Program Directory for Tivoli Workload Scheduler. Version 8 Release 1, Modification Level 0. Program Number 5698-WKB. for Use with OS/390 z/os IBM Scheduler Version 8 Release 1, Modification Level 0 Program Number 5698-WKB for Use with OS/390 z/os Document Date: October 2001 GI10-5796-00 Note Before using this information and the product it supports,

More information

Carbonite Server Backup Portal 8.6. Administration Guide

Carbonite Server Backup Portal 8.6. Administration Guide Carbonite Server Backup Portal 8.6 Administration Guide 2018 Carbonite, Inc. All rights reserved. Carbonite makes no representations or warranties with respect to the contents hereof and specifically disclaims

More information

IBM. Release Notes November IBM Copy Services Manager. Version 6 Release 1

IBM. Release Notes November IBM Copy Services Manager. Version 6 Release 1 IBM Copy Services Manager IBM Release Notes November 2016 Version 6 Release 1 IBM Copy Services Manager IBM Release Notes November 2016 Version 6 Release 1 Note: Before using this information and the

More information

AccuTerm 7 Internet Edition Connection Designer Help. Copyright Schellenbach & Assoc., Inc.

AccuTerm 7 Internet Edition Connection Designer Help. Copyright Schellenbach & Assoc., Inc. AccuTerm 7 Internet Edition Connection Designer Help Contents 3 Table of Contents Foreword 0 Part I AccuTerm 7 Internet Edition 6 1 Description... 6 2 Connection... Designer 6 3 Internet... Client 6 4

More information

TMON for CICS/ESA Release Notes Version 1.5

TMON for CICS/ESA Release Notes Version 1.5 TMON for CICS/ESA Release Notes Version 1.5 TMON for CICS Release Notes Version 1.5 Copyright Notice Copyright IBM Corporation 2001 All rights reserved. May only be used pursuant to a Tivoli Systems Software

More information

Migration Tool. Migration Tool (Beta) Technical Note

Migration Tool. Migration Tool (Beta) Technical Note Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

Sonic ESB Configuration and Management Guide

Sonic ESB Configuration and Management Guide Sonic ESB Configuration and Management Guide Aurea Sonic ESB Configuration and Management Guide 2013 Copyright 2013 Aurea, Inc. All Rights Reserved. These materials and all Aurea Software, Inc. software

More information

IBM Tivoli Monitoring for Databases: DB2. User s Guide. Version SC

IBM Tivoli Monitoring for Databases: DB2. User s Guide. Version SC IBM Tivoli Monitoring for Databases: DB2 User s Guide Version 5.1.0 SC23-4726-00 IBM Tivoli Monitoring for Databases: DB2 User s Guide Version 5.1.0 SC23-4726-00 Note Before using this information and

More information

Tivoli Access Manager for Enterprise Single Sign-On

Tivoli Access Manager for Enterprise Single Sign-On Tivoli Access Manager for Enterprise Single Sign-On Version 5.0 Kiosk Adapter Release Notes Tivoli Access Manager for Enterprise Single Sign-On Version 5.0 Kiosk Adapter Release Notes Note: Before using

More information

Enhanced Support Facility User's Guide For REMCS

Enhanced Support Facility User's Guide For REMCS J2X1-7753-01ENZ0(01) Enhanced Support Facility User's Guide For REMCS Preface Preface Purpose of This Guide This guide explains the setup and operation procedures for using the REMote Customer Support

More information

IBM Copy Services Manager Version 6 Release 1. Release Notes August 2016 IBM

IBM Copy Services Manager Version 6 Release 1. Release Notes August 2016 IBM IBM Copy Services Manager Version 6 Release 1 Release Notes August 2016 IBM Note: Before using this information and the product it supports, read the information in Notices on page 9. Edition notice This

More information

Error Message Reference

Error Message Reference Security Policy Manager Version 7.1 Error Message Reference GC23-9477-01 Security Policy Manager Version 7.1 Error Message Reference GC23-9477-01 Note Before using this information and the product it

More information

SAS Model Manager 2.3

SAS Model Manager 2.3 SAS Model Manager 2.3 Administrator's Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2010. SAS Model Manager 2.3: Administrator's Guide. Cary,

More information

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program )

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT

More information

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information