Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 58

Minimum Requirements for Administrative Access, Create a Local Administration Account

Page 58 highlights

• A maximum of 4096 bit. • Minimum key length of 128 bytes. • Local users only. To create or view the SSH public key: 1. Click Group → Group Configuration. 2. Click the Administration tab. 3. In the Accounts and Groups panel, select either: • All accounts and groups to view both local and remote accounts. • Local accounts to view local accounts only. • Locally authenticated users to view users that have been locally authenticated. 4. Select the account and click Modify. The Modify Administration Account dialog box opens. In the dialog box, use the SSH Public Key tab to view or change attributes of the public key. NOTE: The SSH Public Key tab is available only when all the members of the group are running firmware v9.1.x or later. 5. In the Public key field, enter the value for the account. 6. (Optional) In the Description field, enter a description for the public key. 7. Click OK. Minimum Requirements for Administrative Access To implement any form of system security and take full advantage of Group Manager's other administrative tools, you must: • Be able to establish network access to the group through the group IP address or dedicated management address. • Configure a group administration account with sufficient permissions to manage administrative access. The default account (grpadmin) provides this permission. • Enable the required access options in the Group settings Administration tab for the security method being implemented. Create a Local Administration Account You configure, manage, and authenticate local administration accounts within the group. Local accounts are practical when you need only a small number of administration accounts for the group. The grpadmin account is the default administration account. Dell recommends that you set up an additional account for each administrator, and reserve the default grpadmin account for maintenance operations such as firmware updates. Accounts can be configured to be authenticated through the PS Series group or using LDAP with Active Directory. Prerequisites Depending on the type of account you create, you can select the following options when you create the account: • Select one or more pools the account can manage • Specify the quotas for each pool • Determine whether the account has read-only access to the entire group • Determine whether the account has access to save diagnostics and access to save config • Select replication partners, provided you have configured replication partners 58 About Group-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

A maximum of 4096 bit.
Minimum key length of 128 bytes.
Local users only.
To create or view the SSH public key:
1.
Click
Group
Group
Configuration
.
2.
Click the
Administration
tab.
3.
In the Accounts and Groups panel, select either:
All accounts and groups
to view both local and remote accounts.
Local accounts
to view local accounts only.
Locally authenticated users
to view users that have been locally authenticated.
4.
Select the account and click
Modify
. The Modify Administration Account dialog box opens.
In the dialog box, use the
SSH Public Key
tab to view or change attributes of the public key.
NOTE: The SSH Public Key tab is available only when all the members of the group are running
firmware
v9.1.x or
later.
5.
In the
Public key
field,
enter the value for the account.
6.
(Optional) In the
Description
field,
enter a description for the public key.
7.
Click
OK
.
Minimum Requirements for Administrative Access
To implement any form of system security and take full advantage of Group Manager’s other administrative tools, you must:
Be able to establish network access to the group through the group IP address or dedicated management address.
Configure
a group administration account with
sufficient
permissions to manage administrative access. The default account
(grpadmin) provides this permission.
Enable the required access options in the Group settings Administration tab for the security method being implemented.
Create a Local Administration Account
You
configure,
manage, and authenticate local administration accounts within the group. Local accounts are practical when you need
only a small number of administration accounts for the group.
The grpadmin account is the default administration account. Dell recommends that you set up an additional account for each
administrator, and reserve the default grpadmin account for maintenance operations such as
firmware
updates.
Accounts can be
configured
to be authenticated through the PS Series group or using LDAP with Active Directory.
Prerequisites
Depending on the type of account you create, you can select the following options when you create the account:
Select one or more pools the account can manage
Specify the quotas for each pool
Determine whether the account has read-only access to the entire group
Determine whether the account has access to save diagnostics and access to save
config
Select replication partners, provided you have
configured
replication partners
58
About Group-Level Security