Neoview User Management and Security Administration Guide (R2.5)
List of Tables
1-1 Predefined Users and Roles ..........................................................................................................21
1-2 Security Administration Task Map...............................................................................................29
2-1 Initial Passwords for Predefined Users and Roles........................................................................36
2-2 Neoview Password Encryption Policies........................................................................................41
2-3 Password Quality and Control Policies.........................................................................................44
2-4 User Management and Authentication Logging Policies.............................................................47
2-5 Power Role Management Policies.................................................................................................49
2-6 User Authentication Error and Warning Messages......................................................................54
2-7 Self-Signed Certificate Attributes..................................................................................................56
2-8 CSR Creation Attributes................................................................................................................58
2-9 Certificate Insertion Attributes......................................................................................................59
4-1 Adding a Directory Server Configuration....................................................................................84
4-2 Changing a Directory Server Configuration.................................................................................87
4-3 Removing a Directory Server Configuration................................................................................90
4-4 Viewing a Directory Server Configuration...................................................................................91
5-1 Creating a Role..............................................................................................................................97
5-2 Changing a Database Role Password............................................................................................98
5-3 Deleting a Role..............................................................................................................................99
5-4 Adding a Database User..............................................................................................................100
5-5 Deleting a Database User.............................................................................................................100
5-6 Assigning a Role..........................................................................................................................101
5-7 Revoking a Role...........................................................................................................................102
5-8 Changing a User's Default Role...................................................................................................102
5-9 Changing a Database User Password..........................................................................................103
5-10 Changing Your Own Password...................................................................................................104
5-11 Adding a Platform User..............................................................................................................105
5-12 Deleting a Database User.............................................................................................................105
5-13 Changing a Platform User Password..........................................................................................106
5-14 Changing a Platform Role Password...........................................................................................107
5-15 Changing Your Own Password...................................................................................................108
5-16 VIEW NEO.HP_SECURITY.USERINFO.....................................................................................121
5-17 VIEW NEO.HP_SECURITY.ROLEINFO.....................................................................................122
5-18 VIEW NEO.HP_SECURITY.USERROLEINFO............................................................................123
5-19 VIEW NEO.HP_SECURITY.USERROLELOG.............................................................................125
5-20 VIEW NEO.HP_SECURITY.SYSUSERINFO...............................................................................126
5-21 VIEW NEO.HP_SECURITY.SYSUSERLOG................................................................................127
5-22 VIEW NEO.HP_SECURITY.USERACCESSLOG.........................................................................129
6-1 Database Operations and Who Can Perform Them....................................................................133
6-2 VIEW NEO.HP_SECURITY.NEOUSERS....................................................................................134
6-3 VIEW NEO.HP_SECURITY.NEOROLES....................................................................................135
6-4 VIEW NEO.HP_SECURITY.SCHEMALIST................................................................................136
6-5 VIEW NEO.HP_SECURITY.NEOSCHEMAPRIV.......................................................................137
6-6 VIEW NEO.HP_SECURITY.NEOOBJECTLIST...........................................................................138
6-7 VIEW NEO.HP_SECURITY.NEOOBJECTPRIV..........................................................................140
6-8 VIEW NEO.HP_SECURITY.NEOCOLUMNPRIV......................................................................142
10 List of Tables