Download presentation
Presentation is loading. Please wait.
Published byMadeline York Modified over 8 years ago
1
Securely Managing VMS from a Windows Environment 1
2
Objectives Delegation: –Management tasks to be undertaken by help desk operators –User interface on Windows 2
3
Objectives Delegation: –Management tasks to be undertaken by help desk operators –User interface on Windows Authorization: –Authorization Server to hold permission profiles for logged-in users 3
4
Authorization 4 SEM User Authorization Server Target Servers SEM Authorization Server SEM Agents SEM Client (Software Components)
5
Objectives Delegation: –Management tasks to be undertaken by help desk operators –User interface on Windows Authorization: –Authorization Server to hold permission profiles for logged-in users Software Management: –SEM Authorization Server to hold all scripts for target servers 5
6
Objectives Delegation: –Management tasks to be undertaken by help desk operators –User interface on Windows Authorization: –Authorization Server to hold permission profiles for logged-in users Software Management: –SEM Authorization Server to hold all scripts for target servers Message Signing: –Authorization Server ‘signs’ all transaction messages 6
7
Message Signing 7 SEM User SEM Authorization Server SEM Agents SEM Client
8
Objectives Delegation: –Management tasks to be undertaken by help desk operators –User interface on Windows Authorization: –Authorization Server to hold permission profiles for logged-in users Software Management: –SEM Authorization Server to hold all scripts for target servers Message Signing: –Authorization Server ‘signs’ all transaction messages SEM Databases: –Authorization Server writes databases such as the SEM Audit Trail 8
9
Objectives (continued) Secure Network: –Use of SSL/TLS –Alternative security mechanisms 9
10
Secure Network (SSL/TLS) 10 SEM User SEM Authorization Server SEM Agents SEM Client SSL/TLS
11
Objectives (continued) Secure Network: –Use of SSL/TLS –Alternative security mechanisms Audit Trail: 11
12
Objectives (continued) Secure Network: –Use of SSL/TLS –Alternative security mechanisms Audit trail: Target platforms also to include: – Linux – UNIX – Windows – OS400 … in addition to VMS 12
13
Objectives ( last but not least ) Easily customized 13
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.