IBM logoEnterprise Cloud Management SupportContact Us
ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Submit A QuestionSubmit A Question
RSS Feeds
DrillDown Icon Table of Contents Back
 . . . . . . . . . . . . .
DrillDown Icon Enterprise Cloud
DrillDown Icon Release Notes
DrillDown Icon Known Issues
DrillDown Icon Policies
DrillDown Icon Registration and Login
DrillDown Icon Infinicenter Console
DrillDown Icon Environments
DrillDown Icon Compute Pools
DrillDown Icon Resources Tab
DrillDown Icon Devices Tab
DrillDown Icon Layout
DrillDown Icon Create Virtual Machines
DrillDown Icon VPN Connect
DrillDown Icon Manage Security Groups
DrillDown Icon Server Tasks
DrillDown Icon Network Tab
DrillDown Icon Cloud Services Tab
DrillDown Icon Resource Alerts
DrillDown Icon My Account
DrillDown Icon Enterprise Cloud API
DrillDown Icon Best Practices
DrillDown Icon FAQs
DrillDown Icon Troubleshooting
DrillDown Icon Enterprise Cloud Managed Edition
DrillDown Icon Sales and Support
DrillDown Icon Proprietary Statement
  Email This ArticlePrint PreviewPrint Current Article and All Sub-Articles
 
Manage Security Groups

Manage Security Groups

Authorization of user activities within the Enterprise Cloud, both Infinicenter Console and the API, is based upon Role Based Access Control (RBAC). RBAC is a National Institute of Standards and Technology (NIST) standard.See Role Based Access Control for a full discussion of RBAC as implemented in the Enterprise Cloud.

In the Enterprise Cloud, basic RBAC is implemented through user Roles. Roles permit administrators to restrict access for every business operation of Infinicenter Console based on the role of the user. Enterprise Cloud also offers role-based control over devices assigned to specific security groups, which is implemented through device Security Groups and security group level roles.

Navigate to Manage Security Groups

To manage security groups:

  1. Click Manage Security Groups.
  2. The Manage Security Group Devices dialog appears.

Add Devices to a Security Group

  1. Select a Security Group.
  2. Select one or more devices in Available Devices list.
  3. Click Add to queue the device for addition to the selected security group.
  4. The devices move to Assigned list.

  5. Click Save.

Remove Devices from a Security Group

  1. Select a Security Group.
  2. Select one or more devices in the Assigned list.
  3. Click Remove to queue the selected device for removal from the security group.
  4. The devices move to Available Devices list.

  5. Click Save.