
Security
This chapter discusses about the security aspects of Image Streamer.
The Image Streamer appliance assumes that the following security aspects are met:
• The Image Streamer appliance operates in a secure HPE OneView managed environment and is connected to a secure
management network.
• The Administrator obtains the Golden Images from trusted sources.
• The scripts used in the appliance for personalization or generalization are free from malware.
• The Golden Images reside on the Image Streamer OS deployment server. However, the OS deployment server does
not create or manage sensitive data in the Golden Images.
Roles and Authorization
HPE OneView provides authorization to Image Streamer users. Software administrator is the role that is defined in HPE
OneView to authorize users to manage Image Streamer artifacts. The
User roles and Authorization table illustrates the
different user roles and their respective authorization levels for the artifacts and deployment process.
NOTE: Image Streamer supports only the default global scope All Resources.
Table 4: User roles and Authorization
Role
Image Streamer artifact
management
HPE OneView server profile with OS
deployment
Software Administrator
Full Privileges
View Only
Server Administrator
View Only
Full Privileges
Infrastructure Administrator
Full Privileges
Full Privileges
Backup Administrator
View Only
No Access
Network Administrator
View Only
No Access
Storage Administrator
View Only
No Access
Scope Operator
No Access
No Access
Scope Administrator
No Access
No Access
Server Firmware Administrator
No Access
No Access
Scope Based Access Control
OS Deployment Plans can be scope limited so that different server administrators have access to different subsets of
Deployment Plans.
Security
76