Users Guide
Table Of Contents
- Introduction
- Setup and Administration
- Security Management
- Assigning User Privileges
- Disabling Guest and Anonymous Accounts in Supported Windows Operating Systems
- Configuring the SNMP Agent
- Configuring the SNMP Agent for Systems Running Supported Windows Operating Systems
- Configuring the SNMP Agent on Systems Running Supported Red Hat Enterprise Linux
- Configuring the SNMP Agent on Systems Running Supported SUSE Linux Enterprise Server
- Configuring the SNMP Agent on Systems Running Supported VMware ESX 4.X Operating Systems to Proxy VMware MIBs
- Configuring the SNMP Agent on Systems Running Supported VMware ESXi 4.X Operating Systems
- Firewall Configuration on Systems Running Supported Red Hat Enterprise Linux Operating Systems and SUSE Linux Enterprise Server
- Using Server Administrator
- Server Administrator Services
- Working With Remote Access Controller
- Overview
- Viewing Basic Information
- Configuring the Remote Access Device to use a LAN Connection
- Configuring the Remote Access Device to use a Serial Port Connection
- Configuring the Remote Access Device to use a Serial Over LAN Connection
- Additional Configuration for iDRAC
- Configuring Remote Access Device Users
- Setting Platform Event Filter Alerts
- Server Administrator Logs
- Setting Alert Actions
- Setting Alert Actions for Systems Running Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems
- Setting Alert Actions in Microsoft Windows Server 2003 and Windows Server 2008
- Setting Alert Action Execute Application in Windows Server 2008
- BMC/iDRAC Platform Events Filter Alert Messages
- Understanding Service Names
- Troubleshooting
- Frequently Asked Questions
- Index

18 Setup and Administration
Privilege Levels to Access Server Administrator Services
Table 2-2 summarizes the users who have privileges to access and manage
Server Administrator services.
Table 2-3 defines the user privilege level abbreviations used in Table 2-2.
Authentication
The Server Administrator authentication scheme ensures that the correct
access types are assigned to the correct user privileges. Additionally,
when the command line interface (CLI) is invoked, the Server Administrator
authentication scheme validates the context within which the current
Table 2-1. User Privileges
User Privileges Access Type
View Manage
User Yes No
Power User Yes Yes
Administrator Yes Yes
Elevated Administrator (Linux only) Yes Yes
Table 2-2. Server Administrator User Privilege Levels
Service User Privilege Level Required
View Manage
Instrumentation U, P, A, EA P, A, EA
Remote Access U, P, A, EA A, EA
Storage Management U, P, A, EA A, EA
Table 2-3. Legend for Server Administrator User Privilege Levels
U User
P Power User
A Administrator
EA Elevated Administrator
book.book Page 18 Tuesday, July 6, 2010 12:01 PM