12.07.2015 Views

CA Workload Automation iXp User Guide - CA Technologies

CA Workload Automation iXp User Guide - CA Technologies

CA Workload Automation iXp User Guide - CA Technologies

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security3) Once it receives the contents, the <strong>iXp</strong> Server sends the contents backto the requesting <strong>iXp</strong> Client. The <strong>iXp</strong> Client displays the contents in abrowser window.2.2 SecurityThere are two security methods available for controlling access to <strong>iXp</strong>.1) Native <strong>iXp</strong> security2) Single-Sign On (SSO)<strong>iXp</strong> provides a native multi-layered security model that encompasses dataencryption, user authorization, and optional user authentication. The samesecurity model is applied to both the <strong>iXp</strong> GUI and the <strong>iXp</strong> CLI.In the first model, user access to <strong>iXp</strong> requires validation of the user identity andpassword. All user identities and passwords are managed within <strong>iXp</strong> and have norelation to system/domain IDs and passwords.In the second model, <strong>iXp</strong> leverages the user ID already authenticated to theActive Directory Domain or the local machine. This requires no user/passwordmaintenance in <strong>iXp</strong>.In either case, <strong>iXp</strong> security includes the following features.‣ Data transmission between the server and client machines can besecured and encrypted through current secure HTTP technology. Also,the sensitive data stored by <strong>iXp</strong> is encrypted.‣ Roles can be assigned to the <strong>iXp</strong> user identities that provide read, updateand control privileges on the desired <strong>CA</strong> <strong>Workload</strong> <strong>Automation</strong> AEobjects.‣ The security model is very dynamic and user policies can be changed onthe fly. Changes immediately take effect and a user logout is not required.‣ The <strong>iXp</strong> Administrator can easily manage the security role policiesthrough the <strong>iXp</strong> Admin Tool.ARCHITECTURE 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!