Users Guide
Contents
1 Introduction....................................................................................................................................................6
Installation........................................................................................................................................................................... 6
What is new in this release................................................................................................................................................7
Updating individual system components......................................................................................................................... 7
Storage Management Service.......................................................................................................................................... 7
Instrumentation Service.................................................................................................................................................... 7
Remote Access Controller.................................................................................................................................................7
Logs......................................................................................................................................................................................7
Systems management standards availability...................................................................................................................7
Availability on supported operating systems.............................................................................................................8
Server Administrator Home Page.................................................................................................................................... 8
Other Documents You May Need.................................................................................................................................... 8
Accessing documents from the Dell EMC support site...........................................................................................9
Obtaining Technical Assistance.......................................................................................................................................10
Contacting Dell EMC........................................................................................................................................................10
2 Setup And Administration............................................................................................................................. 11
Role-Based Access Control..............................................................................................................................................11
User privileges..............................................................................................................................................................11
Authentication...................................................................................................................................................................12
Microsoft Windows Authentication..........................................................................................................................12
Red Hat Enterprise Linux And SUSE Linux Enterprise Server Authentication....................................................12
VMware ESXi Server Authentication....................................................................................................................... 12
Encryption..........................................................................................................................................................................13
Assigning User Privileges.................................................................................................................................................13
Adding users to a domain on Windows operating systems................................................................................... 13
Creating Server Administrator users for supported Red Hat Enterprise Linux and SUSE Linux
Enterprise Server operating systems....................................................................................................................... 13
Disabling Guest And Anonymous Accounts In Supported Windows Operating Systems..................................16
Conguring The SNMP Agent.................................................................................................................................. 16
Firewall Conguration On Systems Running Supported Red Hat Enterprise Linux Operating Systems
And SUSE Linux Enterprise Server..........................................................................................................................22
3 Using Server Administrator..........................................................................................................................24
Logging In And Out.......................................................................................................................................................... 24
Server Administrator Local System Login............................................................................................................... 24
Server Administrator Managed System Login — Using the Desktop Icon........................................................ 25
Server Administrator Managed System Login — Using The Web Browser.......................................................25
Central web server login........................................................................................................................................... 25
Using The Active Directory Login.............................................................................................................................26
Single Sign-On............................................................................................................................................................26
Conguring Security Settings On Systems Running A Supported Microsoft Windows Operating System...27
Contents
3