HP Intelligent Management Center v5.1 TACACS+ Authentication Manager Administrator Guide
35
3. Click the Modify icon of the device type or sub-type you want to modify.
The Modify Device Type page appears.
4. Modify the device type information:
Type Name—Enter a device type name, which must be unique in TAM.
Parent Type Name—Cannot be modified.
Description—Enter a brief description of the device type for easy maintenance.
5. Click OK.
Deleting a device type or a sub-type
You cannot delete the following device types:
• A device type or sub-type used by an authorization policy. To delete such a device type, modify the
authorization policy to cancel their associations first. For information about modifying an
authorization policy, see "
Modifying an authorization policy."
• A device type that contains a device or sub-type. To delete such a device type, first change the type
of the device or delete the sub-type. For more information about changing the device type of a
device, see "
Modifying the device area and type."
To delete a device type or a sub-type:
1. Click the Service tab.
2. Select TACACS+ AuthN Manager > Authorization Scenarios > Device Types from the navigation
tree.
The Device Type List displays all device types.
3. Click the Delete icon for the device type or sub-type you want to delete.
4. Click OK.
Viewing devices of a device type or sub-types
If you view devices of a device type that contains sub-types, TAM displays all devices contained in the
sub-types of the device type.
To view the devices of a device type (or those in its sub-types):
1. Click the Service tab.
2. Select TACACS+ AuthN Manager > Authorization Scenarios > Device Types from the navigation
tree.
The Device Type List displays all device types.
3. Click the Device List icon of a device type.
The Device List page appears. In the Query Devices area, TAM automatically sets the selected
device type as the query criteria and displays in the Device List the query result, which includes all
devices contained in the device type and or those in its sub-types. For more information about the
device list, see "Viewing the device list."
Configuring authorized time range policies
TAM allows you to configure authorized time range policies. A device user is controlled by different
authorized time range policies when accessing and managing the devices at different times.