When native authentication is used, all roles except Security are defined in a nested manner. Each role is authorized to perform operations related to its definition, in addition to the commands permitted by lower-level roles.
Superuser: Can perform all operations, configuration tasks, and upgrades. There can only be one Superuser, who is always a local user.
Security: Can define administrators and control LDAP. The Security user is not part of the hierarchical model and has a set of commands that only a Security (or Superuser) can perform.
Administrator: Can perform all Configure operations and also define the Configure- and Monitor-level users. Can perform upgrades.
Configure: Does not exist as a default option, but can be configured from FrontendConfigure or BackendConfigure. Can perform upgrades.
FrontendConfigure: Can perform Monitor operations and frontend-related configurations that include volume manipulations (adding, deleting, and mapping volumes and snapshots) and SDC operations (adding and deleting SDCs).
BackendConfigure: Can perform monitoring operations, upgrades, and backend-related configurations. Operations include:
Protection Domain and Storage Pool operations
Manipulating Fault Sets and SDS
Configuring SDS devices
Configuring replication
Monitor: Can only perform monitoring operations that do not affect the system.
NOTE:You must assign the BackendConfigure role to the users who need to update the system license.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\