Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 56

Administration Account Attributes, Advantages, Attribute, Description

Page 56 highlights

Table 14. Differences Between Authentication Methods Type Advantages Disadvantages Active Directory groups • Good scalability for large environments with many users; you can quickly add many administrator accounts to the group. For example, if a company hires new IT staff, and the "IT Users" group has access to the group, no extra action is required on the part of the group administrator. • Active Directory administrator, not PS Series group administrator, controls which user accounts are in the group. • If the Active Directory/LDAP server is inaccessible, Active Directory accounts cannot be authenticated and logins will fail. • Useful in environments with many PS Series groups; you can configure all groups to use the same LDAP authentication server, thus eliminating the need for maintenance of parallel sets of local accounts. • If users are removed from the Active Directory group, you do not need to update the array's list of administrator accounts to revoke access to the group. Active Directory or RADIUS users • Good for smaller environments in which only a • If users are removed from the Active Directory few Active Directory or RADIUS accounts are group, the accounts remain in the PS Series added. group, counting against the maximum number • PS Series group administrator controls which of user accounts. user accounts are in the group. • The group administrator must manually remove unused Active Directory and LDAP accounts. Local accounts • Good for environments with a small IT staff, or • Using Active Directory and RADIUS provides in cases where a small number of ad-hoc superior scalability to using local accounts. accounts are needed. • Frequent changes to the roster of • PS Series group administrator controls which administrator accounts require the group accounts are in the group. administrator to make frequent updates. • If many PS Series groups are in the environment, parallel sets of administrator accounts must be created to grant administrator access to all groups. Administration Account Attributes Table 15. Administration Account Attributes describes the fields used in creating or modifying an administration account. You might find it beneficial to gather the information for the fields before creating an account. The default administration account (grpadmin) is the only account capable of performing all group operations, and it is also the account you must use to perform firmware updates. Table 15. Administration Account Attributes Attribute Account Name Description Name of the account, up to 16 alphanumeric characters. These characters are also allowed: period (.), hyphen (-), and underscore (_). The first character must be a letter or number. The last character cannot be a period. Active Directory account names can be up to 511 ASCII characters. If you enter user names containing pound signs (#) in the Group Manager CLI, the group only processes the characters preceding the pound sign; the pound sign, and all characters following it, are treated as a comment. For example, if you try to create an account named AdminUser#Account, the resulting account is named AdminUser. The Group Manager GUI does not allow you to input pound signs when creating user names. 56 About Group-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Table 14.
Differences
Between Authentication Methods
Type
Advantages
Disadvantages
Active Directory groups
Good scalability for large environments with
many users; you can quickly add many
administrator accounts to the group. For
example, if a company hires new IT
staff,
and
the “IT Users” group has access to the group,
no extra action is required on the part of the
group administrator.
Useful in environments with many PS Series
groups; you can
configure
all groups to use the
same LDAP authentication server, thus
eliminating the need for maintenance of parallel
sets of local accounts.
If users are removed from the Active Directory
group, you do not need to update the array’s
list of administrator accounts to revoke access
to the group.
Active Directory administrator, not PS Series
group administrator, controls which user
accounts are in the group.
If the Active Directory/LDAP server is
inaccessible, Active Directory accounts cannot
be authenticated and logins will fail.
Active Directory or
RADIUS users
Good for smaller environments in which only a
few Active Directory or RADIUS accounts are
added.
PS Series group administrator controls which
user accounts are in the group.
If users are removed from the Active Directory
group, the accounts remain in the PS Series
group, counting against the maximum number
of user accounts.
The group administrator must manually remove
unused Active Directory and LDAP accounts.
Local accounts
Good for environments with a small IT
staff,
or
in cases where a small number of ad-hoc
accounts are needed.
PS Series group administrator controls which
accounts are in the group.
Using Active Directory and RADIUS provides
superior scalability to using local accounts.
Frequent changes to the roster of
administrator accounts require the group
administrator to make frequent updates.
If many PS Series groups are in the
environment, parallel sets of administrator
accounts must be created to grant
administrator access to all groups.
Administration Account Attributes
Table 15. Administration Account Attributes
describes the
fields
used in creating or modifying an administration account. You might
find
it
beneficial
to gather the information for the
fields
before creating an account.
The default administration account (grpadmin) is the only account capable of performing all group operations, and it is also the
account you must use to perform
firmware
updates.
Table 15. Administration Account Attributes
Attribute
Description
Account Name
Name of the account, up to 16 alphanumeric characters. These characters are also allowed: period (.),
hyphen (-), and underscore (_). The
first
character must be a letter or number. The last character cannot
be a period.
Active Directory account names can be up to 511 ASCII characters.
If you enter user names containing pound signs (#) in the Group Manager CLI, the group only processes
the characters preceding the pound sign; the pound sign, and all characters following it, are treated as a
comment. For example, if you try to create an account named
AdminUser#Account
, the resulting
account is named
AdminUser
. The Group Manager GUI does not allow you to input pound signs when
creating user names.
56
About Group-Level Security