HP Storage Essentials V5.00.01 installation guide (T4283-96011, January 2006)
Table Of Contents
- HP
- Storage Essentials 5.00.01 Installation Guide
- Contents
- Overview
- Installing the Management Server on Microsoft Windows
- Discovering Filers, Tape Libraries, Switches and Storage Systems
- Deploying CIM Extensions
- Installing the CIM Extension for IBM AIX
- Installing the CIM Extension for SGI ProPack for Linux
- Installing the CIM Extension for HP-UX
- Installing the CIM Extension for SUSE and Red Hat Linux
- Installing the CIM Extension for OpenVMS
- Installing the CIM Extension for HP Tru64 UNIX
- Installing the CIM Extension for SGI IRIX
- Installing the CIM Extension for Sun Solaris
- Installing the CIM Extension for Microsoft Windows
- Discovering Applications, Backup Servers and Hosts
- Managing Security
- Troubleshooting
Storage Essentials 5.00.01 Installation Guide 225
15 Managing Security
IMPORTANT: Depending on your license, role-based security may not be available. See the “List of
Features” to determine if you have access to role-based security. The “List of Features” is accessible
from the Documentation Center (Help > Documentation Center in Storage Essentials).
This chapter describes the following:
• ”Managing User Accounts” on page 231
• ”Managing Roles” on page 237
• ”Managing Organizations” on page 239
• ”Changing the Password of System Accounts” on page 244
About the Security for the Management Server
The management server offers security based on roles and organizations. Role-based security
determines access to certain functionality depending on the user account assigned to a role.
Organizations determine if you can modify an element type, such as hosts. The management server
ships with the Everything organization, which lets you modify all element types.
See the following topics for more information:
• ”About Roles” on page 225
• ”About Organizations” on page 228
• ”Planning Your Hierarchy” on page 231
• ”Naming Organizations” on page 231
About Roles
The management server ships with several predefined roles that are listed in the following table.
These roles determine which components of the software a user can access.
For example, users assigned to the Help Desk role have access to Application Viewer and Event
Manager, but not to System Manager, Provisioning Manager, Policy Manager, Backup Manager,
and Reporting. Likewise, users assigned to the domain administrator role have access to all of the
features, as shown in the following table.