Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 54

Types of Administration Accounts, using FTP.

Page 54 highlights

If your environment requires additional security, you might consider a dedicated management network. (See Configure a Management Network for more information.) Administration accounts allow you to specify how much control individual administrators will have over the PS Series group, according to their account type: • Group administrators (all permissions) • Read-only accounts (read access only to a group and can selectively enable configuration/diagnostic collection) • Pool administrators (manage only selected pools, and if group read-only, can enable configuration/diagnostic collection) • Volume administrators (create and manage owned volumes in selected pools) Administration accounts can be managed locally or remotely: • Local accounts - If you have relatively few administration accounts, this method is practical because account authentication occurs within the group. The default administration account, grpadmin, is a local account created automatically when the group is first configured. • Remote using Active Directory (LDAP) - If you use Active Directory in your environment, you can configure a group to use LDAP to authenticate administration accounts. You can grant group, pool, or volume administrator privileges to individual Active Directory users or to entire Active Directory groups. • Remote using a RADIUS server - If you have a large number of administration accounts, you can use an external Remote Authentication Dial-in User Service (RADIUS) server to authenticate administration accounts. NOTE: You cannot simultaneously use RADIUS and Active Directory to authenticate administrator accounts. However, you can always add local accounts. The default administration account, grpadmin, provides full access to Group Manager's features and allows you to perform all group operations. Some operations, such as upgrading array firmware, can be performed only by the grpadmin user. NOTE: Dell recommends that you set up an account for each administrator, with no users sharing a single account. Further, Dell recommends that the group administrator monitor the activity of other accounts. Types of Administration Accounts Table 13. Types of Administration Accounts lists administration account types and their privileges. The attributes can be applied to both local accounts and Active Directory accounts or groups. Table 13. Types of Administration Accounts Account Type Description grpadmin Can perform all group management tasks, including managing the group, storage pools, members, NAS clusters, volumes, and accounts. Group Administrator can also enable secure erase to securely erase data so that it cannot be recovered. Only the grpadmin account can update member firmware or fetch diagnostic files using FTP. You cannot rename, delete, or change the account type for the grpadmin account. Group administrator Read-only Pool administrator Can perform the same tasks as the grpadmin account, except updating member firmware. Can view information about all group objects except NAS clusters, but cannot change the group configuration. Read-only users can also save diagnostics and save the group configuration. Can view the volumes, members, snapshots, and other objects only in the pool or pools for which the account has authorization. They cannot manage members. Optionally, pool administrators can view information about all group objects except NAS clusters. Pool administrators can assign volumes to volume administrators, provided that the pool administrator has access to the pool containing the volumes, and the volume administrator has sufficient free quota space. Pool administrators cannot change the resources to which they have access. 54 About Group-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

If your environment requires additional security, you might consider a dedicated management network. (See
Configure
a
Management Network
for more information.)
Administration accounts allow you to specify how much control individual administrators will have over the PS Series group,
according to their account type:
Group administrators (all permissions)
Read-only accounts (read access only to a group and can selectively enable
configuration/diagnostic
collection)
Pool administrators (manage only selected pools, and if group read-only, can enable
configuration/diagnostic
collection)
Volume administrators (create and manage owned volumes in selected pools)
Administration accounts can be managed locally or remotely:
Local accounts — If you have relatively few administration accounts, this method is practical because account authentication
occurs within the group. The default administration account, grpadmin, is a local account created automatically when the group
is
first
configured.
Remote using Active Directory (LDAP) — If you use Active Directory in your environment, you can
configure
a group to use
LDAP to authenticate administration accounts. You can grant group, pool, or volume administrator privileges to individual Active
Directory users or to entire Active Directory groups.
Remote using a RADIUS server — If you have a large number of administration accounts, you can use an external Remote
Authentication Dial-in User Service (RADIUS) server to authenticate administration accounts.
NOTE: You cannot simultaneously use RADIUS and Active Directory to authenticate administrator accounts. However,
you can always add local accounts.
The default administration account, grpadmin, provides full access to Group Manager’s features and allows you to perform all group
operations. Some operations, such as upgrading array
firmware,
can be performed only by the grpadmin user.
NOTE: Dell recommends that you set up an account for each administrator, with no users sharing a single account.
Further, Dell recommends that the group administrator monitor the activity of other accounts.
Types of Administration Accounts
Table 13. Types of Administration Accounts
lists administration account types and their privileges. The attributes can be applied to
both local accounts and Active Directory accounts or groups.
Table 13. Types of Administration Accounts
Account Type
Description
grpadmin
Can perform all group management tasks, including managing the group, storage pools, members,
NAS clusters, volumes, and accounts. Group Administrator can also enable
secure erase
to
securely erase data so that it cannot be recovered.
Only the grpadmin account can update member
firmware
or fetch diagnostic
files
using FTP. You
cannot rename, delete, or change the account type for the grpadmin account.
Group administrator
Can perform the same tasks as the grpadmin account, except updating member
firmware.
Read-only
Can view information about all group objects except NAS clusters, but cannot change the group
configuration.
Read-only users can also save diagnostics and save the group
configuration.
Pool administrator
Can view the volumes, members, snapshots, and other objects only in the pool or pools for which
the account has authorization. They cannot manage members. Optionally, pool administrators can
view information about all group objects except NAS clusters.
Pool administrators can assign volumes to volume administrators, provided that the pool
administrator has access to the pool containing the volumes, and the volume administrator has
sufficient
free quota space.
Pool administrators cannot change the resources to which they have access.
54
About Group-Level Security