This chapter deals with securing the IBM Tivoli Business Systems Manager
environment. The IBM Tivoli Business Systems Manager servers’ security model
relies heavily on Windows security features.
The discussion in this chapter is structured as:
13.1, “Resource security” on page 422 discusses the Windows security
model that we used
13.1.3, “Windows user ID and groups” on page 429 discusses
password-related issues
13.4, “TBSM operators and workspaces” on page 434 illustrates the IBM
Tivoli Business Systems Manager operator definition within our doma ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.