Users Guide
Table Of Contents
- Introduction
- Setup And Administration
- Role-Based Access Control
- Authentication
- Encryption
- Assigning User Privileges
- Adding Users To A Domain On Windows Operating Systems
- Creating Server Administrator Users For Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems
- Disabling Guest And Anonymous Accounts In Supported Windows Operating Systems
- Configuring The SNMP Agent
- Configuring The SNMP Agent On Systems Running Supported Windows Operating Systems
- Enabling SNMP Access On Remote Hosts (Windows Server 2003 Only)
- Changing The SNMP Community Name
- Configuring Your System To Send SNMP Traps To A Management Station
- Configuring The SNMP Agent On Systems Running Supported Red Hat Enterprise Linux
- SNMP Agent Access Control Configuration
- Server Administrator SNMP Agent Install Actions
- Changing The SNMP Community Name
- Configuring Your System To Send Traps To A Management Station
- Configuring The SNMP Agent On Systems Running Supported SUSE Linux Enterprise Server
- Sever Administrator SNMP Install Actions
- Enabling SNMP Access From Remote Hosts
- Changing The SNMP Community Name
- Configuring The SNMP Agent On Systems Running Supported VMware ESX 4.X Operating Systems To Proxy VMware MIBs
- Configuring The SNMP Agent On Systems Running Supported VMware ESXi 4.X And ESXi 5.X Operating Systems
- Configuring Your System To Send Traps To A Management Station
- Firewall Configuration On Systems Running Supported Red Hat Enterprise Linux Operating Systems And SUSE Linux Enterprise Server
- Using Server Administrator
- Logging In And Out
- Server Administrator Local System Login
- Server Administrator Managed System Login — Using the Desktop Icon
- Server Administrator Managed System Login — Using The Web Browser
- Central Web Server Login
- Using The Active Directory Login
- Single Sign-On
- Configuring Security Settings On Systems Running A Supported Microsoft Windows Operating System
- The Server Administrator Home Page
- Using The Online Help
- Using The Preferences Home Page
- Using The Server Administrator Command Line Interface
- Logging In And Out
- Server Administrator Services
- Working With Remote Access Controller
- Viewing Basic Information
- Configuring The Remote Access Device To Use A LAN Connection
- Configuring The Remote Access Device To Use A Serial Port Connection
- Configuring The Remote Access Device To Use A Serial Over LAN Connection
- Additional Configuration For iDRAC
- Configuring Remote Access Device Users
- Setting Platform Event Filter Alerts
- Server Administrator Logs
- Setting Alert Actions
- Setting Alert Actions For Systems Running Supported Red Hat Enterprise Linux And SUSE Linux Enterprise Server Operating Systems
- Setting Alert Actions In Microsoft Windows Server 2003 And Windows Server 2008
- Setting Alert Action Execute Application In Windows Server 2008
- BMC/iDRAC Platform Events Filter Alert Messages
- Troubleshooting
- Frequently Asked Questions
Table 3. Privileges Required To Manage Server Administrator Services (continued)
Instrumentation User, Power User, Administrator,
Elevated Administrator
Power User, Administrator, Elevated
Administrator
Remote Access User, Power User, Administrator,
Elevated Administrator
Administrator, Elevated Administrator
Storage Management User, Power User, Administrator,
Elevated Administrator
Administrator, Elevated Administrator
Authentication
The Server Administrator authentication scheme ensures that the correct access types are assigned to the correct user
privileges. Additionally, when the command line interface (CLI) is invoked, the Server Administrator authentication scheme
validates the context within which the current process is running. This authentication scheme ensures that all Server
Administrator functions, whether accessed through the Server Administrator home page or CLI, are properly authenticated.
Microsoft Windows Authentication
On supported Microsoft Windows operating systems, Server Administrator uses Integrated Windows Authentication (formerly
called NTLM) to authenticate. This authentication system allows Server Administrator security to be incorporated in an overall
security scheme for your network.
Red Hat Enterprise Linux And SUSE Linux Enterprise Server
Authentication
On supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server operating systems, Server Administrator uses various
authentication methods based on the Pluggable Authentication Modules (PAM) library. Users can log in to Server Administrator
either locally or remotely using different account management protocols, such as LDAP, NIS, Kerberos, and Winbind.
VMware ESX Server 4.X Authentication
VMware ESX Server uses the Pluggable Authentication Modules (PAM) structure for authentication when users access the ESX
Server host. The PAM configuration for VMware services stores paths to the authentication modules and is located at /etc/
pam.d/vmware-authd.
The default installation of ESX Server uses /etc/passwd authentication, similar to Linux, but you can configure ESX Server to
use another distributed authentication mechanism.
NOTE:
On systems running VMware ESX Server 4.x operating system, to login to Server Administrator, all users require
Administrator privileges. For information on assigning roles, see the VMware documentation.
VMware ESXi Server 5.X Authentication
ESXi Server authenticates users accessing ESXi hosts using the vSphere/VI Client or Software Development Kit (SDK). The
default installation of ESXi uses a local password database for authentication. ESXi authentication transactions with Server
Administrator are also direct interactions with the vmware-hostd process. To make sure that authentication works efficiently
for your site, perform basic tasks such as setting up users, groups, permissions, and roles, configuring user attributes, adding
your own certificates, and determining whether you want to use SSL.
NOTE:
On systems running VMware ESXi Server 5.0 operating system, to login to Server Administrator, all users require
Administrator privileges. For information on assigning roles, see the VMware documentation.
10 Setup And Administration