Cisco Explorer 4700 Installationsanleitung Seite 575

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 648
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 574
15-7
Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance
OL-26645-02
Chapter 15 Managing the ACE Appliance
Managing Users
Understanding Domains
Cisco ACE appliance provides a predefined default domain that contains all objects. You cannot modify
or delete the predefined domain. Additional domains can be defined by the system administrator. A
domain is a collection of managed objects to which a user is given access. By setting up a customized
domain, you are filtering a subset of objects on the network. The user is then given access to this domain.
For example, a user can see only what is in the domain to which they have access (achieved through row
filtering). If the default domain contains 50 objects and the customized domain, dom1, consists of the
following domain objects: Rserver rs1, Rserver rs2, Serverfarm sf1, Serverfarm sf2, and Accesslist
extended acl1, a user associated with domain dom1, can see only those five objects within the whole
context.
The rows a user sees in any table are filtered according to the domain to which that user has access.
Note If you need to restrict a users access, you must assign a role-domain pair. Otherwise, no matter
what roles the user may have, that user will not be able to access any specific resources, and,
therefore, will have no powers on the system.
Related Topics
Managing Domains, page 15-31
Guidelines for Managing Domains, page 15-31
Managing Users
Use the Role-Based Access Control feature to specify the people that are allowed to log onto the system.
The following sections describe how to manage user accounts:
Guidelines for Managing Users, page 15-8
Displaying a List of Users, page 15-8
Creating User Accounts, page 15-8
Modifying User Accounts, page 15-10
Deleting User Accounts, page 15-10
Displaying Current User Sessions, page 15-11
Note The ACE supports local user authentication using a local database on the ACE or through remote
authentication using one or more AAA servers. AAA remote servers are grouped into independent
groups of TACACS+, RADIUS, or LDAP servers. Authentication allows you to control user access to
the ACE by requiring specification of a valid username and password, or no password verification. When
you configure the ACE appliance from the CLI to support the user authentication and accounting
functions, the Device Manager honors the tasks that are performed by the specified remote server. See
the Security Guide, Cisco ACE Application Control Engine for details about authentication and
accounting.
In addition, the role and domains that a user is associated with on a remote server will also honored by
the Device Manager.
Seitenansicht 574
1 2 ... 570 571 572 573 574 575 576 577 578 579 580 ... 647 648

Kommentare zu diesen Handbüchern

Keine Kommentare