Administrator Guide

sysadmin Exec Config Interface Line Router IP
Route-map Protocol MAC
netoperator
testadmin netadmin Exec Config Interface Line Router IP
Route-map Protocol MAC
Related
Commands
userrole — create user roles.
userrole
Create user roles for the role-based security model.
Syntax
userrole name inherit existing-role-name
To delete a role name, use the no userrole name command. Note that the reserved role names may not be
deleted.
Parameters
name
Enter a text string for the name of the user up to 63 characters. It cannot be one of the
system defined roles (sysadmin, secadmin, netadmin, netoperator).
inherit
existing-
role-name
Enter the inherit keyword then specify the system defined role to inherit permissions
from (sysadmin, secadmin, netadmin, netoperator).
Defaults none
Command Modes CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms, see the relevant Dell EMC
Networking OS Command Line Reference Guide.
Version Description
9.10(0.1) Introduced on the S6010-ON and S4048T-ON.
9.10(0.0) Introduced on the S3148.
9.10(0.0) Introduced on the S6100-ON.
9.8(2.0) Introduced on the S3100 series.
9.8(1.0) Introduced on the Z9100-ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000-ON.
9.5(0.1) Introduced on the Z9500.
9.5(0.0) Introduced on the Z9000, S6000, S4820T, S4810, MXL.
Usage Information
Instead of using the system defined user roles, you can create a new user role that best matches your
organization. When you create a new user role, you first inherit permissions from one of the system defined roles.
Otherwise you would have to create a user role from scratch. You then restrict commands or add commands to
that role. For information about this topic, See Modifying Command Permissions for Roles.
NOTE: You can change user role permissions on system pre-defined user roles or user-defined
user roles.
Important Points to Remember
Consider the following when creating a user role:
Only the system administrator and user-defined roles inherited from the system administrator can create roles
and usernames. Only the system administrator, security administrator, and roles inherited from these can use
the role command to modify command permissions. The security administrator and roles inherited by
security administrator can only modify permissions for commands they already have access to.
Security 1431