Securing Pegasus

 

You can find out the options that are available for ensuring that the CIM server is secure in this topic. One of the most significant concerns for a Pegasus administrator is how to configure security. This is particularly true for i5/OS® because of i5/OS platform security requirements, significant functions were added to the open source implementation. In Pegasus, there are two types of security checks, authentication and authorization.

 

Parent topic:

Common Information Model

Related concepts
Enterprise Identity Mapping (EIM) cimconfig usage information Network authentication service Host name resolutions considerations