Users Guide

secadmin Exec Config
sysadmin Exec Config Interface Line Router IP
Route-map Protocol MAC
netoperator
testadmin netadmin Exec Config Interface Line Router IP
Route-map Protocol MAC
Related Commands userrole, username
userrole
Create user roles for the role-based security model.
Syntax
userrole name inherit existing-role-name
To delete a role name, use the no userrole name command. Note that the reserved role names may not be
deleted.
Parameters
name
Enter a text string for the name of the user up to 63 characters. It cannot be one
of the system dened roles (sysadmin, secadmin, netadmin, netoperator).
inherit existing-role-
name
Enter the inherit keyword then specify the system dened role to inherit
permissions from (sysadmin, secadmin, netadmin, netoperator).
Defaults none
Command Modes CONFIGURATION
Command History
Version Description
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000-ON.
9.5(0.1) Introduced on the Z9500.
9.5(0.0) Introduced on the Z9000, S6000, S4820T, S4810, MXL.
Usage Information
Instead of using the system dened user roles, you can create a new user role that best matches your
organization. When you create a new user role, you rst inherit permissions from one of the system dened
roles. Otherwise you would have to create a user role from scratch. You then restrict commands or add
commands to that role. For information about this topic, See Modifying Command Permissions for Roles.
NOTE: You can change user role permissions on system pre-dened user roles or user-dened
user roles.
Important Points to Remember
Consider the following when creating a user role:
Only the system administrator and user-dened roles inherited from the system administrator can create
roles and usernames. Only the system administrator, security administrator, and roles inherited from
these can use the role command to modify command permissions. The security administrator and roles
inherited by security administrator can only modify permissions for commands they already have access
to.
Make sure you select the correct role you want to inherit.
1404
Security