3.2.2 Operation design procedure
Operation design involves the following tasks:
Evaluating users and access permissions
Evaluate the management of users and user groups and the granting of permissions according to user roles.
Evaluating operations using groups
Evaluate multi-tenant operations that use service groups so that accesses (by any user group) to services can be restricted.
Evaluating operations using external authentication linkage
Evaluate use of JP1/Base or Active Directory for management of users.
Evaluating operations for access control by device
Evaluate access control for the target devices when services are run and the management of connection destination information and authentication information.
Evaluating the method of executing plug-ins
Evaluate the method of executing plug-ins when the operation-target host is the local host.
Evaluating the working folders and execution directories for the operation-target devices
Evaluate the working folders and execution directories used when plug-ins are executed.
Evaluating the port numbers used by the operation-target devices
Evaluate the port numbers used for connecting to the operation-target devices.
Evaluating the task retention period
Evaluate the retention periods from task completion to task archiving and from task archiving to task deletion.
Evaluating the status notification method
Evaluate how to report the status of the system and of tasks. Available methods include use of email and event notification.
Evaluating maintenance
Evaluate system backup and database reorganization as elements of periodic maintenance procedures.
Evaluating error handling
Evaluate how to handle errors, including how to collect data in the event of a failure during JP1/AO system operation.
Evaluating audit logs
Evaluate audit logs, including whether audit logs are to be issued and the number and size of audit files.