Security Management on IBM Dynamic Workload Console

Slides:



Advertisements
Similar presentations
The Purposes of this presentation is to demonstrate the complete YP Quotes workflow. The whole process of completing an order is extremely time efficient.
Advertisements

lyoungblood ******** This is a standard login screen to gain access to the NoteShare program. Click the “OK” button to continue.
EBO Overview Part 1 Ingrid Bongers MT(ASCP) MBA eClinicalWorks Certified Trainer.
Click to add text SAP XBP 3.0 exploitation TWS Education + Training.
© 2012 IBM Corporation Tivoli Workload Automation Informatica Power Center.
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
Project Management Details Proposals and Contracts Schedules Budgets Key Practices –Hiring –Firing –Pay administration –Promotion.
Class Collaboration with Edmodo. What is Edmodo? - Cliphttp:// social learning network for teachers, students,
1 CMPT 275 Software Engineering Requirements Gathering Activity Janice Regan,
Oral Communications for Business Teamwork. Give me your best definition of teamwork…
Introduction to Software Software. Types of software Click on each type of software to find out what it does.
Entity Administrator Training Working with ADEConnect & Entity Admin Portal ADEConnect.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Courselist Project Automated Graduate Student Information System Final project for CS 3354.
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Delegation Skills. Objective Explain What is Delegation Explain Why People Do Not Delegate Describe the Benefits of Delegating List What Tasks Should.
Whirlwind Tour and Hands-on Demos of Notable New Features in Project 2010 Carl Chatfield, PMP Presented to Puget Sound MPUG Chapter September & October,
Copyright © 2007, Oracle. All rights reserved. Implementing Role-Based Security.
GE 121 – Engineering Design Engineering Design GE121 Managing The Design Process Part II Lecture 11B.
Workflow Manager Demo. Login Page Annotator Group Main Page ‘Details’: link to see the workflow detail Filter selection Click to view interface question.
Maintaining and Updating Windows Server 2008 Lesson 8.
CS415 Project Team 7 G - Squad Steve Culver Kevin Gorski Jenny Harris Tim Hunt Leon Organ Katie Overton Arin Sarros.
“ Unleash the power of trusted collaboration” PortalTalk is a ready-made and complete solution for trusted collaboration in the cloud. It seamlessly integrates.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTRODUCTION TO INTERSTAGE BPM.
Project Management & Team Logistics Presented by Clayton Ou & Novia Wong.
Workload Scheduler plug-in for JSR 352 Java Batch IBM Workload Scheduler IBM.
TASKS HAVE ALL YOUR TASKS LISTED IN ONE PLACE.
Installing and Configuring Job Scheduling Services (JSS) 1.2 & TWS Distributed Connector 8.1 for use with the Job Scheduling Console, v. 1.2 or 1.3.
HOW TO SELECT THE BEST PLUMBING COMPANY? HOW TO SELECT THE BEST PLUMBING COMPANY?
What’s New in Microsoft Dynamics NAV 2017?
Host & Application Preparation
SharePoint Permissions Manager 2017 – Product Demo
Users, Groups, and Roles in Cognos 8
Partner Smart Assist Service
IBM Workload Scheduler
Import Cron and Windows Task Scheduler definitions
Dynamic Workload Console Upcoming Release Usability Questionnaire
RFPMonkey.com External Review
الجوانب القانونية لاعسار الشركات الصغيرة التجربة البريطانية.
Why BOW-TIE & HAZID monitor?
FAST Administration Training
Why HAZOP-SIL monitor? Knowing what should be done for: HAZOP-SIL
قانون المنافسة ومنع الاحتكار
Workforce Mobile (iPhone)
Host & Application Preparation
Why HSEMS monitor? Knowing what should be done for:
Why PTW (SIMOP) monitor?
Why JHA monitor? Knowing what should be done for: Job Hazard Analysis
Why HSE Plan monitor? Knowing what should be done for: HSE Plan
Workforce Mobile (Android)
Administering Your Network
Why SCE monitor? Knowing what should be done for:
User Creation.
IBM Workload Automation
Why Interface monitor? Knowing what should be done for:
Lecture 7 PROJECT SCHEDULING Ferdinand Fassa.
Example of Privilege Check Flow for Cockpit Items
Quid Usage.
Delegation Skills.
Navigating GP Security
Why Sub-System monitor?
Why QRA monitor? Knowing what should be done for:
DO Now-1/17/18 Get back into your groups from yesterday.
Why HAZOP-HSE monitor? Knowing what should be done for HAZOP-HSE issues (i.e. communication of responsibilities) HAZOP-HSE register HAZOP-HSE Actions Follow-Up.
Why SIMOP monitor? Knowing what should be done for SIMOP
Advanced multi-user capabilities in Dev Center
Bellringer: Nov. 12 On page R30-31 in the blue textbook, the resources pages describe how to write a good introduction. Read through the suggestions and.
DIY GP Maintenance Paul Johnson.
Affordable ways of getting good features in a website.
Presentation transcript:

Security Management on IBM Dynamic Workload Console IBM Workload Scheduler 9.3 FP2 Security Management on IBM Dynamic Workload Console IBM

Tim, the IBM Workload Scheduler administrator “As an IBM Workload Scheduler administrator, I want to grant fine-tuned access control using a simple interface” ~Tim, IBM Workload Scheduler Administrator “I don’t want to change the security too often, that’s dangerous” “I use a prefix to identify groups of jobs and job streams. For each group I need someone who has read-write access, and someone else who has read-only access.” Quote - interview

Tim’s job today Today, Tim needs to add a new sub team to the scheduler team. Tim assigns a prefix to the new team, «AS». All the job streams created by this team will start with «AS» so that he can easily identify them.

Tim’s job today The new team has two people: John, who defines the workload Margaret, who can only monitor the workload. Margaret must not have access to any job details because she works for a third party company.

Tim’s job today Let’s see how Tim can do his job quicky by using the new Role-based security (Live Demo)

Backup charts

Dynamic workload console Tim logs in into the DWC: All the security task are arranged in a single page.

Dynamic workload console He creates a security domain...

Dynamic workload console For all the object starting with «AS»

Dynamic workload console Now he starts granting access to John

Dynamic workload console For John, he reuses the «DEVELOPER» role, he has already defined.

Dynamic workload console And selects the previously created domain «IT_PAYROLL». The console suggests what are the roles the that John needs to have in the DWC!

Dynamic workload console Now he starts granting access to Margaret

Dynamic workload console For Margareth, he cannot reuse the «OPERATOR» role, because Margareth is not allowed to see job details.. So he duplicates it...

Dynamic workload console He switches to «List» the level of access to workload object

Dynamic workload console .. and checks all other permissions ...

Dynamic workload console For Margareth, now he only needs to give the role in the standard DWC view.

Tim has finished his job today! Well done! Tim has finished his job today!