Users Guide

Contents
1 Introduction.....................................................................................................................6
Installation.......................................................................................................................................................................... 6
Updating individual system components.............................................................................................................................6
Storage Management Service............................................................................................................................................6
Instrumentation Service......................................................................................................................................................7
Remote Access Controller.................................................................................................................................................. 7
Logs....................................................................................................................................................................................7
What is new in this release................................................................................................................................................. 7
Systems management standards availability.......................................................................................................................8
Availability on supported operating systems................................................................................................................. 8
Server Administrator Home Page.......................................................................................................................................9
Other Documents You May Need.......................................................................................................................................9
Accessing documents from Dell support site.............................................................................................................. 10
Obtaining Technical Assistance.........................................................................................................................................10
Contacting Dell................................................................................................................................................................. 10
2 Setup And Administration.............................................................................................. 12
Role-Based Access Control...............................................................................................................................................12
User privileges.............................................................................................................................................................12
Authentication...................................................................................................................................................................13
Microsoft Windows Authentication.............................................................................................................................13
Red Hat Enterprise Linux And SUSE Linux Enterprise Server Authentication............................................................. 13
VMware ESXi Server 5.X Authentication....................................................................................................................13
Encryption.........................................................................................................................................................................13
Assigning User Privileges.................................................................................................................................................. 13
Adding users to a domain on Windows operating systems..........................................................................................14
Creating Server Administrator users for supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server
operating systems.......................................................................................................................................................14
Disabling Guest And Anonymous Accounts In Supported Windows Operating Systems............................................. 16
Configuring The SNMP Agent.................................................................................................................................... 16
Firewall Configuration On Systems Running Supported Red Hat Enterprise Linux Operating Systems And SUSE
Linux Enterprise Server...............................................................................................................................................21
3 Using Server Administrator........................................................................................... 23
Logging In And Out.......................................................................................................................................................... 23
Server Administrator Local System Login...................................................................................................................23
Server Administrator Managed System Login — Using the Desktop Icon..................................................................23
Server Administrator Managed System Login — Using The Web Browser................................................................24
Central web server login.............................................................................................................................................24
Using The Active Directory Login...............................................................................................................................25
Single Sign-On........................................................................................................................................................... 25
Configuring Security Settings On Systems Running A Supported Microsoft Windows Operating System.................25
3