Users Guide
Table Of Contents
- User’s Guide
- Introduction
- What’s New for Version 6.1
- Setup and Administration
- Using Server Administrator
- Server Administrator Services
- Working With Remote Access Controller
- Overview
- Viewing Basic Information
- Configuring the Remote Access Device to use a LAN Connection
- Configuring the Remote Access Device to use a Serial Port Connection
- Configuring the Remote Access Device to use a Serial Over LAN Connection
- Additional Configuration for iDRAC
- Configuring Remote Access Device Users
- Setting Platform Event Filter Alerts
- Server Administrator Logs
- Setting Alert Actions
- Troubleshooting
- Frequently Asked Questions
- Glossary
- Index

Setup and Administration 17
Setup and Administration
Security Management
Server Administrator provides security through role-based access control
(RBAC), authentication, and encryption for both the Web-based and
command line interfaces.
Role-Based Access Control
RBAC manages security by determining the operations that can be executed
by persons in particular roles. Each user is assigned one or more roles,
and each role is assigned one or more user privileges that are permitted to
users in that role. With RBAC, security administration corresponds closely to
an organization's structure.
User Privileges
Server Administrator grants different access rights based on the user's
assigned group privileges. The four user levels are: User, Power User,
Administrator, and Elevated Administrator.
•
Users
can view most information.
•
Power Users
can set warning threshold values and configure which alert
actions are to be taken when a warning or failure event occurs.
•
Administrators
can configure and perform shutdown actions, configure
Auto Recovery actions in case a system has a non-responsive operating
system, and clear hardware, event, and command logs.
Administrators
can
also configure the system to send e-mails.
• Elevated Administrators
can view and manage information.
Server Administrator grants read-only access to users logged in with User
privileges, read and write access to users logged in with Power User privileges,
and read, write, and administrator access to users logged in with
Administrator and
Elevated Administrator
privileges. See Table 3-1.
book.book Page 17 Monday, June 22, 2009 11:05 AM