beautypg.com

6 users and authorizations, 7 directory services, 8 networking and security – HP Systems Insight Manager User Manual

Page 6

background image

Adding new SNMP rules...........................................................................................................121

6 Users and authorizations.........................................................................123

User configuration rights......................................................................................................................123
Users and authorizations tabs...............................................................................................................123
Users and user groups.........................................................................................................................124

Creating new users........................................................................................................................125

Command line interface............................................................................................................127

Creating new user groups...............................................................................................................127

Command line interface............................................................................................................128

Editing user accounts and user groups..............................................................................................128

Command line interface............................................................................................................129

Deleting user accounts and user groups............................................................................................130

Command line interface............................................................................................................130

User and user group reports............................................................................................................131

Command line interface............................................................................................................131

Default user templates....................................................................................................................131

Toolboxes..........................................................................................................................................132

Creating new toolboxes..................................................................................................................133

Command line interface............................................................................................................133

Editing toolboxes...........................................................................................................................133

Command line interface............................................................................................................134

Deleting toolboxes.........................................................................................................................134

Command line interface............................................................................................................134

Toolbox report...............................................................................................................................135

Command line interface............................................................................................................135

Authorizations....................................................................................................................................136

Creating new authorizations............................................................................................................137

Command line interface............................................................................................................139

Updating authorizations..................................................................................................................140

Command line interface............................................................................................................140

Deleting authorizations...................................................................................................................141

Command line interface............................................................................................................141

Authorizations report......................................................................................................................141

Command line interface............................................................................................................142

System groups...............................................................................................................................142

Managing system groups from the GUI........................................................................................142
Managing system groups from the CLI using mxngroup..................................................................142

7 Directory Services...................................................................................145

Configuring directory servers................................................................................................................145
Configuring directory groups................................................................................................................146

8 Networking and security.........................................................................149

Secure Sockets Layer and certificates.....................................................................................................149
Sign in and accounts...........................................................................................................................149
Single Login, Replicate Agent Settings, and Install Software and Firmware..................................................149
Certificates.........................................................................................................................................150
About login........................................................................................................................................150

Single Login..................................................................................................................................150
Signing in.....................................................................................................................................151
Sign in authentication on Linux and HP-UX........................................................................................151

Configuring PAM on a Linux system.............................................................................................152
Configuring PAM on an HP-UX system.........................................................................................152

About secure task execution..................................................................................................................152
Configuring the system link...................................................................................................................153
Configuring login events......................................................................................................................153

6

Table of Contents