IBM logoEnterprise Cloud Management SupportContact Us
ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Submit A QuestionSubmit A Question
RSS Feeds
DrillDown Icon Table of Contents Back
 . . . . . . . . . . . . .
DrillDown Icon Release Notes
DrillDown Icon Known Issues
DrillDown Icon Policies
DrillDown Icon Registration and Login
DrillDown Icon Infinicenter Console
DrillDown Icon Environments
DrillDown Icon Compute Pools
DrillDown Icon Resources Tab
DrillDown Icon Devices Tab
DrillDown Icon Layout
DrillDown Icon Create Virtual Machines
DrillDown Icon VPN Connect
DrillDown Icon Manage Security Groups
DrillDown Icon Server Tasks
DrillDown Icon Change Server Power State
DrillDown Icon Configure Server
DrillDown Icon Copy Virtual Machines
DrillDown Icon Retry
DrillDown Icon Delete Server
DrillDown Icon Move Devices
DrillDown Icon Relocate a Virtual Machine
DrillDown Icon Snapshots
DrillDown Icon Rename Devices
DrillDown Icon View Tasks
DrillDown Icon Convert License
DrillDown Icon Manage IPs
DrillDown Icon Assign Security Groups
DrillDown Icon Cloud Services
DrillDown Icon Connect to the Console of a Virtual Machine
DrillDown Icon Device Tags
DrillDown Icon Install VMware Tools
DrillDown Icon Mount ISO
DrillDown Icon Upgrade VM Hardware
DrillDown Icon Network Tab
DrillDown Icon Cloud Services Tab
DrillDown Icon Resource Alerts
DrillDown Icon My Account
DrillDown Icon Enterprise Cloud API
DrillDown Icon Best Practices
DrillDown Icon FAQs
DrillDown Icon Troubleshooting
  Email This ArticlePrint PreviewPrint Current Article and All Sub-Articles
 
Assign Security Groups

Assign Security Groups to a Device

Authorization of user activities within the Enterprise Cloud, both Infinicenter Console and the API, is based upon Role Based Access Control (RBAC). RBAC is a National Institute of Standards and Technology (NIST) standard. See Role Based Access Control for a full discussion of RBAC as implemented in the Enterprise Cloud.

In the Enterprise Cloud, basic RBAC is implemented through user Roles. Roles permit administrators to restrict access for every business operation of Infinicenter Console based on the role of the user. Enterprise Cloud also offers role-based control over devices assigned to specific security groups, which is implemented through device Security Groups and security group level roles.

Navigate to Assign Security Groups for a Virtual Machine

To assign security groups for a virtual machine:

  1. Select a virtual machine.
  2. Click Administrative Tasks.
  3. Click Assign To Security Groups.

You can also assign security groups for a virtual from the context menu.

  1. Right-click a virtual machine.
  2. Click Administrative Tasks.
  3. Click Assign To Security Groups.

Navigate to Assign Security Groups for a Physical Server

To assign security groups for a physical server:

  1. Select a physical server.
  2. Click Assign To Security Groups.

You can also assign security groups for a physical server from the context menu.

  1. Select a physical server.
  2. Click Assign To Security Groups.

Add Security Groups to a Device

    The Assign Device To Security Groups dialog appears.

  1. Select one or more security groups in Available Security Groups list.
  2. Click Add to queue the security groups for addition to the selected device.
  3. The selected security groups move to Assigned To list.

  4. Click Save.

Remove Security Groups from a Device

    The Assign Device To Security Groups dialog appears.

  1. Select one or more security groups in the Assigned To list.
  2. Click Remove to queue the security groups for removal from the selected device.
  3. The selected security groups move to Available Security Groups list.

  4. Click Save.