Users Guide

Table Of Contents
Setup and Administration 17
Setup and Administration
Security Management
Server Administrator provides security through role-based access control (RBAC), authentication,
and encryption for both the Web-based and command line interfaces.
Role-Based Access Control
RBAC manages security by determining the operations that can be executed by persons in particular
roles. Each user is assigned one or more roles, and each role is assigned one or more user privileges
that are permitted to users in that role. With RBAC, security administration corresponds closely to
an organization's structure.
User Privileges
Server Administrator grants different access rights based on the user's assigned group privileges.
The three user levels are: User, Power User, and Administrator.
Users can view most information.
Power Users can set warning threshold values and configure which alert actions are to be taken when
a warning or failure event occurs.
Administrators can configure and perform shutdown actions, configure Auto Recovery actions in
case a system has a non-responsive operating system, and clear hardware, event, and command logs.
Administrators can also configure the system to send e-mails.
Server Administrator grants read-only access to users logged in with User privileges, read and write
access to users logged in with Power User privileges, and read, write, and admin access to users logged
in with Administrator privileges. See Table 3-1.
Table 3-1. User Privileges
User Privileges Access Type
Admin Write Read
User X
Power User XX
Admin XXX