Cisco Explorer 4700 Installationsanleitung Seite 573

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 648
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 572
15-5
Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance
OL-26645-02
Chapter 15 Managing the ACE Appliance
Controlling Access to the Cisco ACE Appliance
Related Topics
Types of Users, page 15-5
Understanding Roles, page 15-5
Understanding Operations Privileges, page 15-6
Understanding Domains, page 15-7
Managing Users, page 15-7
Types of Users
Two types of users configure and monitor the ACE appliance:
Default user—Individuals associated with the data center or IT department where the ACE
appliance is installed. The default administrative account (user ID admin) is a system user account
that is preconfigured on the system. The admin user password is previously set when the system was
installed. You can change the password for the admin user account in the same manner as any user
password (see Managing Users, page 15-7).
Predefined system roles are specified in terms of roles, domains, and operations privileges. Each
role can work with a specific set of operations and domains in a context.
Assigned users—Users to whom you want to grant access to ACE appliance. You can assign users
limited access by selecting roles and domains to which they belong. Users are not allowed to change
to other contexts and can work with a specific set of operations and domains in the context in which
they were created.
Related Topics
Managing Users, page 15-7
Guidelines for Managing Users, page 15-8
Displaying a List of Users, page 15-8
Creating User Accounts, page 15-8
Understanding Roles
User roles determine the privileges that a user has, the features they can access, and the actions they can
take in a particular context.
Cisco ACE appliance provides a set of predefined roles (see Table 15-2 on page 15-9). Additional roles
can also be defined by the system administrator. Roles are specified in terms of resource types and
operations privileges known as rules. For each role, rules provide permissions about which resource
types a role can work with and what operations a role can perform on each resource type.
Each user is assigned one role (Network-Monitor is the default) and inherit the operations privileges
specified for each of the rules assigned to that role. Users are assigned one role. Each role can have
different access privileges (in the form of rules) that are independent of other assigned roles.
The options a user sees in the menu are filtered according to that users role.
Seitenansicht 572
1 2 ... 568 569 570 571 572 573 574 575 576 577 578 ... 647 648

Kommentare zu diesen Handbüchern

Keine Kommentare