Making APIs Work for You (Part 5)

Key Takeaways
  • User security management in BlueCat Address Manager (BAM) is critical to reducing risk by tightly controlling who can perform configuration changes.
  • Security automation can be enhanced by using APIs to systematically manage user and group access rights rather than relying on manual configuration.
  • Restricting access with appropriate permissions ensures that only authorized users can modify specific DNS, DHCP, and IPAM objects within BAM.
  • Administrators can add and delete users in BAM while assigning precise role-based permissions to align with organizational security policies.
  • Managing access rights at both user and group levels enables scalable, consistent enforcement of security controls across the environment.

Welcome to Part 5 of Making APIs Work for You.

Our community specialist, Vivek Mistry, is your guide, and today, Vivek will focus on user security management. He will discuss how to enhance security automation and demonstrate how to reduce risk to changes on BAM by restricting access with appropriate rights, as well as how to add and delete users in BlueCat Address Manager by managing access rights for users and groups. Plus, more.

⏳ Cisco Live is almost here. Put BlueCat on your agenda for smarter, more secure networks.