Users Guide

Table Of Contents
Contents
1 Introduction..................................................................................................................... 6
Installation.......................................................................................................................................................................... 6
Updating individual system components.............................................................................................................................6
Storage Management Service............................................................................................................................................ 6
Instrumentation Service......................................................................................................................................................7
Remote Access Controller.................................................................................................................................................. 7
Logs....................................................................................................................................................................................7
What is new in this release..................................................................................................................................................7
Systems management standards availability....................................................................................................................... 7
Availability on supported operating systems..................................................................................................................8
Server Administrator Home Page....................................................................................................................................... 8
Other Documents You May Need....................................................................................................................................... 8
Accessing documents from the support site.................................................................................................................9
Obtaining Technical Assistance......................................................................................................................................... 10
Contacting Dell EMC.........................................................................................................................................................10
2 Setup And Administration...............................................................................................11
Role-Based Access Control................................................................................................................................................11
User privileges............................................................................................................................................................. 11
Authentication...................................................................................................................................................................12
Microsoft Windows Authentication............................................................................................................................. 12
Red Hat Enterprise Linux And SUSE Linux Enterprise Server Authentication..............................................................12
VMware ESXi Server Authentication...........................................................................................................................12
Encryption.........................................................................................................................................................................12
Assigning User Privileges.................................................................................................................................................. 12
Adding users to a domain on Windows operating systems.......................................................................................... 13
Creating Server Administrator users for supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server
operating systems.......................................................................................................................................................13
Disabling Guest And Anonymous Accounts In Supported Windows Operating Systems..............................................15
Conguring The SNMP Agent.................................................................................................................................... 15
Firewall Conguration On Systems Running Supported Red Hat Enterprise Linux Operating Systems And SUSE
Linux Enterprise Server...............................................................................................................................................19
3 Using Server Administrator............................................................................................21
Logging In And Out........................................................................................................................................................... 21
Server Administrator Local System Login.................................................................................................................... 21
Server Administrator Managed System Login — Using the Desktop Icon...................................................................21
Server Administrator Managed System Login — Using The Web Browser.................................................................22
Central web server login.............................................................................................................................................22
Using The Active Directory Login................................................................................................................................22
Single Sign-On............................................................................................................................................................23
Conguring Security Settings On Systems Running A Supported Microsoft Windows Operating System..................23
3