You are here: Configure > Configure Role-Based Access Control > Configuration Examples > IBM Admin Role Based Access Control Configuration

IBM Admin Role-Based Access Control Configuration

The IBM Admin Role manages IBM resources, runs Copy and Use Data policies on those resources, and generates IBM related reports. The IBM Admin is also responsible for configuring work flow templates to allow other ECX users to run Copy and Use Data policies using IBM resources without having direct access to them.

Resource Pool Configuration

Providers Tab

Providers tab

  1. Set up the Providers screen to include the root level for all IBM storage resources.
  2. Note: FCM resources are managed by the VMware Admin Role.
  3. Select a specific SMTP server.

Policies Tab

Policies Tab

  1. Select the root level of IBM Catalog, IBM Copy, and IBM Use policies.
  2. Select the root Report policy.
  3. Select the root All Storage Workflows policy.
  4. Select the root All Schedules policy.

Reports Tab

Reports Tab

  1. Under Protection Compliance, select the IBM RPO Compliance report.
  2. Under Storage Utilization, select the IBM related reports.

Security Tab

  1. No Security Resources will be assigned to this role.

Screens Tab

Screens Tab

  1. Select all available Screens except Logs. The Logs function contains audit logs that this user should not have access to.
  2. Name and submit the Resource Pool.

Role Configuration

Role Configuration

  1. Select the permissions listed above.
  2. Name and submit the Role.

IBM Admin Account Configuration

IBM Admin Account Configuration

  1. Create a new account and link it to the newly created IBM Admin Resource Pool and Role.

 


Catalogic ECX™ 2.4

© 2016 Catalogic Software, Inc. | All rights reserved. | 7/15/2016

MySupportKnowledge Base | Trademarks | info@catalogicsoftware.com