Users Guide

Table Of Contents
Chapter 1: Introduction................................................................................................................. 6
OMSA Customer Survey....................................................................................................................................................6
Installation............................................................................................................................................................................. 6
What is new in this release................................................................................................................................................ 7
Supported operating systems........................................................................................................................................... 7
Updating individual system components........................................................................................................................7
Storage Management Service.......................................................................................................................................... 8
Instrumentation Service.....................................................................................................................................................8
Remote Access Controller.................................................................................................................................................8
Logs.........................................................................................................................................................................................8
Systems management standards availability.................................................................................................................8
Availability on supported operating systems...........................................................................................................8
Server Administrator Home Page....................................................................................................................................9
Other Documents You May Need....................................................................................................................................9
Accessing support content from the Dell EMC support site.............................................................................10
Obtaining Technical Assistance...................................................................................................................................... 10
Contacting Dell EMC.........................................................................................................................................................10
Chapter 2: Setup And Administration...........................................................................................12
Role-Based Access Control............................................................................................................................................. 12
User privileges...............................................................................................................................................................12
Authentication.....................................................................................................................................................................13
Microsoft Windows Authentication......................................................................................................................... 13
Red Hat Enterprise Linux And SUSE Linux Enterprise Server Authentication..............................................13
VMware ESXi Server Authentication...................................................................................................................... 13
Encryption............................................................................................................................................................................13
Assigning User Privileges................................................................................................................................................. 14
Adding users to a domain on Windows operating systems................................................................................ 14
Creating Server Administrator users for supported Red Hat Enterprise Linux and SUSE Linux
Enterprise Server operating systems.................................................................................................................. 14
Disabling Guest And Anonymous Accounts In Supported Windows Operating Systems........................... 16
Configuring The SNMP Agent.................................................................................................................................. 16
Firewall Configuration On Systems Running Supported Red Hat Enterprise Linux Operating
Systems And SUSE Linux Enterprise Server.................................................................................................... 22
Chapter 3: Using Server Administrator........................................................................................ 24
Logging In And Out........................................................................................................................................................... 24
Server Administrator Local System Login............................................................................................................. 24
Server Administrator Managed System Login Using the Desktop Icon................................................... 24
Server Administrator Managed System Login Using The Web Browser................................................. 25
Central web server login............................................................................................................................................25
Using The Active Directory Login............................................................................................................................26
Single Sign-On..............................................................................................................................................................26
Configuring Security Settings On Systems Running A Supported Microsoft Windows Operating
System....................................................................................................................................................................... 26
Contents
Contents 3