Task 3: planning dsm/scm users and security, Curity settings, see, Task 3: planning dsm/scm users and – HP Integrity NonStop H-Series User Manual
Page 78: Security, Task, Planning dsm/scm users and security
![background image](/manuals/397210/78/background.png)
Planning the DSM/SCM System Environment and
User Security
DSM/SCM User’s Guide — 529846-014
4 - 9
Task 3: Planning DSM/SCM Users and Security
For more information on software inputs and product groups, see
Software Input Groups or Product Groups
4. Enter the CNFGINFO process name (optional); then click OK. SETUP asks if you
will use RSC or Winsock.
5. Select Winsock:
a. Click the Winsock button; then click OK. SETUP asks for the full path name of
the WINSOCK.DLL file.
b. Enter the name or IP address of the host system you will enter in INITENV;
then click OK.
c.
Enter the IP port number that you will enter in INITENV for the DSM/SCM
Winsock service.
d. Click OK.
6. Enter the host system name; then click OK. SETUP updates your DSMSCM.INI file
with the information you entered. A dialog box appears indicating that SETUP is
finished and asking if you want to start the Planner Interface. If you are performing
a full configuration of DSM/SCM, indicate No. You can launch the Planner Interface
later when you need it.
7. After SETUP finishes, a program group called DSM/SCM appears, containing:
The DSMSCM icon, which launches the Planner Interface
The CNFGINFO icon, which launches the Configuration Information tool
The DSM/SCM and CNFGINFO softdoc files in text format
To access these items, select Start>Program>DSM/SCM on your PC desktop.
Task 3: Planning DSM/SCM Users and Security
Setting security for different DSM/SCM users (planners, database administrators, and
operators) determines what tasks they have permission to perform:
Planners have permission to plan, build, and apply software configurations. For
more information, see
Operators have permission to initiate tasks on an assigned target system, usually
as directed by a planner. For more information, see
Database administrators have permission to:
Maintain the DSM/SCM database
Manage security of the DSM/SCM installation files and files on target systems
Establish user access permissions for target systems
Often installs or updates the configuration of DSM/SCM on all systems