beautypg.com

4 setting up users and access control – HP XP Array Manager Software User Manual

Page 4

background image

Updating license status ....................................................................................................... 37
Viewing license information ................................................................................................. 38
License information on the License Keys window
..................................................................... 38

3 Discovering, registering, and adding management targets ..................... 41

Setting up storage resources ....................................................................................................... 41
Registering storage systems
........................................................................................................ 41

About registering and removing a storage system ................................................................... 41
Prerequisites for registering a storage system .......................................................................... 42
Registering a storage system ................................................................................................ 43
Changing storage system information .................................................................................... 44
About acquiring the most recent storage system information
..................................................... 44
Acquiring the most recent storage system information .............................................................. 45
Operations available to SMI-S enabled storage systems
.......................................................... 45

Registering hosts ....................................................................................................................... 46

About registering a host ...................................................................................................... 46
Methods for registering hosts ............................................................................................... 47
Priority for acquiring the WWN ........................................................................................... 48
Registering hosts by using Host Data Collector ....................................................................... 49
Registering hosts manually by specifying the WWN target ...................................................... 50
Registering hosts using host scan
.......................................................................................... 50
Registering hosts using merge hosts ...................................................................................... 51
About changing host settings and information ........................................................................ 52
Workflow for detecting hosts
................................................................................................ 52
Updating host information registered by using Host Data Collector ........................................... 53
Changing settings for a manually registered host .................................................................... 55
Changing settings for a host registered by using Device Manager agent
................................... 55
About removing hosts and releasing associated resources ........................................................ 56
Removing hosts and releasing associated resources ................................................................ 57

4 Setting up users and access control .................................................... 59

Setting up users and access control ............................................................................................. 59
About user accounts and controlling access to resources
................................................................ 59
Creating and managing user accounts ........................................................................................ 61

Creating a user account ...................................................................................................... 61
User ID and password policies ............................................................................................. 62
Editing the profile for a user account ..................................................................................... 63
Editing your own user profile
............................................................................................... 63
Changing the password for a user account ............................................................................ 64
Changing your own password
............................................................................................. 64
Changing permissions for a user account
.............................................................................. 64
Changing the lock status of user accounts .............................................................................. 65
Configuring external authentication for users
.......................................................................... 65
Configuring external authentication for groups ....................................................................... 66

Controlling access to resources ................................................................................................... 67

About access control ........................................................................................................... 67
Access control examples ..................................................................................................... 69
About resource groups ........................................................................................................ 70
Prerequisites for creating resource groups .............................................................................. 71
Creating resource groups
.................................................................................................... 71
Editing a resource group ..................................................................................................... 72
About user groups .............................................................................................................. 73
User group roles ................................................................................................................ 74
Custom roles ...................................................................................................................... 75

4