Top
Systemwalker Operation Manager  Technical Guide
FUJITSU Software

4.2.2 Systemwalker Authentication Repository

By using the Systemwalker authentication repository, Systemwalker product's user management can be centralized, resulting in more secure operations for the entire system, as well as a reduction of the administrative duties of the system administrator. Also, if single sign-on can use the Systemwalker authentication repository, then operations staff can seamlessly and securely use multiple Systemwalker products with a single login.

When the Systemwalker authentication repository is used, the system administrator is able to configure the following:

By centrally managing users with the Systemwalker authentication repository, the following effects will be seen from a security perspective:

If the Extended User Management function is enabled, it can be used to control which users can access Systemwalker Operation Manager. If the Extended User Management function is disabled and the Systemwalker authentication repository is not used (the Systemwalker authentication repository settings at the connection destination have not been set), then the operating system's user authentication can be used to control access to Systemwalker Operation Manager.

Refer to "Defining Users (When Using a Systemwalker Authentication Repository)" in the Systemwalker Operation Manager Installation Guide for more information.

Refer to "2.10 User Management" for an overview.