Users Guide

Setup and Administration 21
Setup and Administration
Security Management
Server Administrator provides security through role-based access control
(RBAC), authentication, and encryption for both the Web-based and
command line interfaces.
Role-Based Access Control
RBAC manages security by determining the operations that can be executed
by persons in particular roles. Each user is assigned one or more roles, and
each role is assigned one or more user privileges that are permitted to users in
that role. With RBAC, security administration corresponds closely to an
organization's structure.
User Privileges
Server Administrator grants different access rights based on the user's
assigned group privileges. The three user levels are: User, Power User, and
Administrator.
Users
can view most information.
Power Users
can set warning threshold values and configure which alert
actions are to be taken when a warning or failure event occurs.
Administrators
can configure and perform shutdown actions, configure
Auto Recovery actions in case a system has a non-responsive operating
system, and clear hardware, event, and command logs.
Administrators
can
also configure the system to send e-mails.
Server Administrator grants read-only access to users logged in with User
privileges, read and write access to users logged in with Power User privileges,
and read, write, and administrator access to users logged in with
Administrator privileges. See Table 3-1.
book.book Page 21 Monday, July 7, 2008 2:59 PM