Users Guide

1 Introduction................................................................................................................................. 6
Installation...............................................................................................................................................................................6
Updating individual system components............................................................................................................................ 6
Storage Management Service............................................................................................................................................. 7
Instrumentation Service........................................................................................................................................................7
Remote Access Controller....................................................................................................................................................7
Logs......................................................................................................................................................................................... 7
What is new in this release................................................................................................................................................... 7
Systems management standards availability......................................................................................................................8
Availability on supported operating systems................................................................................................................ 8
Server Administrator Home Page........................................................................................................................................8
Other Documents You May Need....................................................................................................................................... 8
Accessing documents from Dell support site...............................................................................................................9
Obtaining Technical Assistance..........................................................................................................................................10
Contacting Dell..................................................................................................................................................................... 10
2 Setup And Administration............................................................................................................ 11
Role-Based Access Control................................................................................................................................................. 11
User privileges................................................................................................................................................................. 11
Authentication...................................................................................................................................................................... 12
Microsoft Windows Authentication............................................................................................................................. 12
Red Hat Enterprise Linux And SUSE Linux Enterprise Server Authentication.......................................................12
VMware ESXi Server 5.X Authentication....................................................................................................................12
Encryption............................................................................................................................................................................. 12
Assigning User Privileges.....................................................................................................................................................12
Adding users to a domain on Windows operating systems.......................................................................................13
Creating Server Administrator users for supported Red Hat Enterprise Linux and SUSE Linux Enterprise
Server operating systems......................................................................................................................................... 13
Disabling Guest And Anonymous Accounts In Supported Windows Operating Systems.....................................15
Configuring The SNMP Agent......................................................................................................................................15
Firewall Configuration On Systems Running Supported Red Hat Enterprise Linux Operating Systems
And SUSE Linux Enterprise Server..........................................................................................................................19
3 Using Server Administrator..........................................................................................................21
Logging In And Out.............................................................................................................................................................. 21
Server Administrator Local System Login...................................................................................................................21
Server Administrator Managed System Login — Using the Desktop Icon............................................................ 21
Server Administrator Managed System Login — Using The Web Browser..........................................................22
Central web server login............................................................................................................................................... 22
Using The Active Directory Login................................................................................................................................23
Single Sign-On................................................................................................................................................................23
Configuring Security Settings On Systems Running A Supported Microsoft Windows Operating System......23
The Server Administrator home page...............................................................................................................................24
Server Administrator user interface differences across modular and non-modular systems..............................26
Global Navigation Bar....................................................................................................................................................26
Contents
Contents 3