About the Virtual Business Services security model

This topic describes the Virtual Business Services' security model as applied to the managed hosts.

For information about the security model for Veritas InfoScale Operations Manager, see the Veritas InfoScale Operations Manager Management Server User Guide.

Only root users of UNIX systems and users with administrative privileges on Windows systems can perform virtual business service operations from the managed hosts using the VBS CLI. Other users cannot perform any virtual business service operations. However, Virtual Business Services provide a security mechanism to prevent hosts that are outside the virtual business service boundary from performing valid operations or from breaching security.

The security mechanism is based on using an embedded Web server inside the VBS daemon. The embedded web server makes use of VxAT. The communication among different VBS daemons happen over a secure channel based on the https protocol.

Note:

VBS daemon communicates through port 2410. Ensure that firewall filters do not block this port on all hosts participating in the virtual business service.