Getting started
Requirements
Before you add a target system to Bravura Security Fabric :
Plan ahead. For example, determine the purpose of the target system: Is it a source of profile IDs? Is it a trusted system that can be used to authenticate users? What resources should Bravura Security Fabric manage on the target system?
Configure the actual target system as described in the Connector Pack documentation.
Depending on the type of system, this may be as simple as creating a target system administrator account on the target system. Some systems require that you install client software on the Bravura Security Fabric server and/or that you perform more configuration on the target system itself to allow Bravura Security Fabric to perform the required operations using the administrator accounts you provided. Other systems require that you write a script to define operations. Ensure that you read and follow all steps described in the ”Preparation” section for each target system.
Determine the settings that you must configure when you add the target system to Bravura Security Fabric .
The “Targeting” section for each target system describes the required or recommended settings. See Target system options for a description of all available options.
Navigation steps
Use the Target system information page to add or modify general configuration information for a target system. To navigate to this page:
Click Manage the System > Resources > Target systems .
For target systems on which you can manage inventory items, you can also click Manage the system > Inventory > Target systems.
Click:
Manually defined to manually configure a new target system, or modify an existing target system that was manually defined.
Discovery templates to add, modify, or remove templates used to define target systems.
Automatically discovered to modify or remove target systems that have been automatically set up from discovery templates, via manually-managed discovered objects or automatically via import rules.
To define:
A new manually-defined target system, or template, click Add new...
An existing target system or template, search for, or select the target system you want to view or modify
From an existing target system’s information page, you can access additional configuration pages by clicking the appropriate tab:
Credentials | Defines administrator IDs for the target system. |
Authorization | Defines authorization requirements for the target system – how many authorizers, and which authorizers. You can also define how many authorizers must deny the request for the assignment to be denied. |
Resource operations | Configure resource operations to determine whether the software connector or a human implementer will carry out tasks on target systems. |
Role enforcement | The role enforcement engine can identify users who have excessive or insufficient access according to their role and issue workflow requests to correct the variance. This tab allows you to set target-level enforcement settings, and generate reports. |
Discovery options | Configure discovery options to extract information about workstation or server objects found on an Active Directory or Windows server target system. |
Test connection | Test administrator credentials and user listing. This tab is hidden for IT Service Management (Ticket) systems. |
Logs | View target system log files. |
From any of these pages, you can click the General tab to return to the page.