Though your enterprise is a distributed environment across many computers, Control-M provides you with a single point of control. The Control-M Configuration Manager lets you administer, manage, monitor, configure, and maintain all Control-M components, including Control-M/Servers, Control-M/Agents, remote hosts, and so on.
The main administrative tasks that administrators perform include:
Control-M security is three-tiered. It is defined in the Control-M/EM, Control-M/Server and Control-M/Agent levels. Control-M/EM security and Control-M/Server security are centered around the user that is defined for each job. These security mechanisms authorize:
You define Control-M/EM security using the Control-M/EM Authorization window. Security can be defined at the user level and group level. Users can be associated with multiple groups. A Control-M/EM Audit facility records data about the occurrence of a wide variety of security-sensitive activities.
Security for communications between Control-M/Server and Control-M/EM components can be enhanced by using SSL. At Control-M for z/OS sites, the Control-M security mechanism interacts with external security tools used at the site (such as RACF, ACF2/SAF, and TOP SECRET). Control-M/Agents, which actually process the jobs, utilize operating system security; it is centered around the owner that is defined for each job. When a Control-M/Agent receives a job execution request, it submits the job on behalf of the owner, but only if the owner is defined to the operating system security.
Parent Topic |