beautypg.com

Task 3: planning dsm/scm users and security, Curity settings, see, Task 3: planning dsm/scm users and – HP Integrity NonStop H-Series User Manual

Page 78: Security, Task, Planning dsm/scm users and security

background image

Planning the DSM/SCM System Environment and
User Security

DSM/SCM User’s Guide — 529846-014

4 - 9

Task 3: Planning DSM/SCM Users and Security

For more information on software inputs and product groups, see

Managing

Software Input Groups or Product Groups

on page 7-11.

4. Enter the CNFGINFO process name (optional); then click OK. SETUP asks if you

will use RSC or Winsock.

5. Select Winsock:

a. Click the Winsock button; then click OK. SETUP asks for the full path name of

the WINSOCK.DLL file.

b. Enter the name or IP address of the host system you will enter in INITENV;

then click OK.

c.

Enter the IP port number that you will enter in INITENV for the DSM/SCM
Winsock service.

d. Click OK.

6. Enter the host system name; then click OK. SETUP updates your DSMSCM.INI file

with the information you entered. A dialog box appears indicating that SETUP is
finished and asking if you want to start the Planner Interface. If you are performing
a full configuration of DSM/SCM, indicate No. You can launch the Planner Interface
later when you need it.

7. After SETUP finishes, a program group called DSM/SCM appears, containing:

The DSMSCM icon, which launches the Planner Interface

The CNFGINFO icon, which launches the Configuration Information tool

The DSM/SCM and CNFGINFO softdoc files in text format

To access these items, select Start>Program>DSM/SCM on your PC desktop.

Task 3: Planning DSM/SCM Users and Security

Setting security for different DSM/SCM users (planners, database administrators, and
operators) determines what tasks they have permission to perform:

Planners have permission to plan, build, and apply software configurations. For
more information, see

Planner Tasks

on page 4-14.

Operators have permission to initiate tasks on an assigned target system, usually
as directed by a planner. For more information, see

Operator Tasks

on page 4-16

Database administrators have permission to:

Maintain the DSM/SCM database

Manage security of the DSM/SCM installation files and files on target systems

Establish user access permissions for target systems

Often installs or updates the configuration of DSM/SCM on all systems

This manual is related to the following products: