Hitachi

JP1 Version 12 JP1/Automatic Operation Overview and System Design Guide 


3.2.2 Operation design procedure

Operation design involves the following tasks:

  1. Evaluating users and access permissions

    Evaluate the management of users and user groups and the granting of permissions according to user roles.

  2. Evaluating operations using groups

    Evaluate multi-tenant operations that use service groups so that accesses (by any user group) to services can be restricted.

  3. Evaluating operations using external authentication linkage

    Evaluate use of JP1/Base or Active Directory for management of users.

  4. Evaluating operations for access control by device

    Evaluate access control for the target devices when services are run and the management of connection destination information and authentication information.

  5. Evaluating the method of executing plug-ins

    Evaluate the method of executing plug-ins when the operation-target host is the local host.

  6. Evaluating the working folders and execution directories for the operation-target devices

    Evaluate the working folders and execution directories used when plug-ins are executed.

  7. Evaluating the port numbers used by the operation-target devices

    Evaluate the port numbers used for connecting to the operation-target devices.

  8. Evaluating the task retention period

    Evaluate the retention periods from task completion to task archiving and from task archiving to task deletion.

  9. Evaluating the status notification method

    Evaluate how to report the status of the system and of tasks. Available methods include use of email and event notification.

  10. Evaluating maintenance

    Evaluate system backup and database reorganization as elements of periodic maintenance procedures.

  11. Evaluating error handling

    Evaluate how to handle errors, including how to collect data in the event of a failure during JP1/AO system operation.

  12. Evaluating audit logs

    Evaluate audit logs, including whether audit logs are to be issued and the number and size of audit files.