The Adaptive Computing Controller (ACC) application enables centralized management of large scale system landscapes and offers flexible service and resource management. As a single point of control, ACC needs to be secured against unauthorized access.
The most important factor in providing system security is your own security policy. This help topic helps in implementing a security policy, but it cannot replace your own investment of time, assets, and strict adherence to the security guidelines of your software vendors (such as database and operating system). We recommend that you dedicate sufficient time and allocate ample resources to implement your security policy and to maintain the level of security that you desire.
The important factors to be considered for ACC security are:
...
· User Management: Only authorized users are granted access to ACC. User credentials must remain strictly confidential to ensure maximum security.
More information: ACC User Management
· Network Security: Communication needs must be supported without allowing unauthorized access to your network.
More information: ACC Network Security
· Database Connection: Unauthorized access is not allowed to the database.
More information: ACC Database Connection
ACC supports role-based access. This facilitates users to perform observations, operations (start/stop/relocate), configurations, mass operations (start/stop), and archiving in ACC.
The groups and roles defined for ACC are:
Group |
Roles |
AC_Observer |
ACC_Observing |
AC_Operator |
ACC_Observing , ACC_Operation |
AC_Administrator |
ACC_Observing, ACC_Operation, ACC_Configuration, ACC_Archiving |