Dell EqualLogic PS6210XS EqualLogic Group Manager Administrator s Guide PS Ser - Page 60

About RADIUS Accounts, RADIUS Attributes for Administration Accounts

Page 60 highlights

4. Click Delete and confirm that you want to delete the account. NOTE: Dell recommends that administrator account names not be reused after they have been deleted. All accounts can always view their own audit log information, and new accounts with previously used account names will be able to view audit records for the old account. About RADIUS Accounts If you have a large number of accounts, you can use an external RADIUS server to simplify account management and centralize the management of administration accounts. RADIUS is the abbreviation for Remote Authentication Dial-In User Service, which provides a central authorization and authentication service for all access requests. The RADIUS server authenticates administration accounts and also determines the account privileges. You can also use a RADIUS accounting server to monitor the login and logout times for accounts that a RADIUS server authenticates. If you use Active Directory in your environment, you can also configure the group to use LDAP to authenticate administration accounts. You can grant group, pool, volume administrator, or read-only privileges to individual Active Directory users or to entire Active Directory groups. RADIUS servers are implemented in different ways. Depending on your implementation, a RADIUS server can verify account credentials against a local database, or it can verify them against an external resource such as a Microsoft Windows Active Directory service domain. NOTE: External administration accounts depend on the availability of the RADIUS server and any related resources. If these resources are not available, accounts cannot be authenticated and a login does not succeed. For information about using Active Directory to manage and authenticate administration accounts, see the Technical Report Using Active Directory for Account Authentication to a PS Series Group on the customer support website. For other RADIUS implementations, see your RADIUS server documentation for information about setting up the RADIUS server and configuring vendor-specific attributes (VSAs). You can use multiple RADIUS authentication servers for increased availability. RADIUS Attributes for Administration Accounts A RADIUS server uses attributes to authorize accounts as group administrator, pool administrator, volume administrator, or read-only, and to store account contact information. For security reasons, Dell recommends that you require vendor-specific attributes. See your RADIUS server documentation for information on how to set attributes. For each account, you must set the Service-Type attribute to one of these values: • EQL-Admin-Privilege-Specifies that the account is either a group administrator account, a pool administrator account, or a volume administrator account. If you do not specify the EQL-Admin-Privilege attribute, the account defaults to group administrator. • NAS-Prompt-Specifies that the account is a read-only account. In addition, you must configure vendor-specific attributes (VSAs) for each account if you meet one of these conditions: • You want to create a pool administrator account. You must specify the EQL-Admin-Privilege attribute and the AdminPool-Access attribute. • You want to create a volume administrator account. You must specify the EQL-Admin-Privilege attribute, the AdminPool-Access attribute, and (optionally) the Admin-Repl-Site-Access attribute. NOTE: A replication quota must be included inside the Admin-Repl-Site-Access attribute for authentication to work properly. • You want to create a read-only account. You must specify the EQL-Admin-Privilege attribute and the Admin-AccountType attribute. 60 About Group-Level Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

4.
Click
Delete
and
confirm
that you want to delete the account.
NOTE: Dell recommends that administrator account names not be reused after they have been deleted. All accounts can
always view their own audit log information, and new accounts with previously used account names will be able to view
audit records for the old account.
About RADIUS Accounts
If you have a large number of accounts, you can use an external RADIUS server to simplify account management and centralize the
management of administration accounts. RADIUS is the abbreviation for Remote Authentication Dial-In User Service, which provides
a central authorization and authentication service for all access requests.
The RADIUS server authenticates administration accounts and also determines the account privileges. You can also use a RADIUS
accounting server to monitor the login and logout times for accounts that a RADIUS server authenticates.
If you use Active Directory in your environment, you can also
configure
the group to use LDAP to authenticate administration
accounts. You can grant group, pool, volume administrator, or read-only privileges to individual Active Directory users or to entire
Active Directory groups.
RADIUS servers are implemented in
different
ways. Depending on your implementation, a RADIUS server can verify account
credentials against a local database, or it can verify them against an external resource such as a Microsoft Windows Active Directory
service domain.
NOTE: External administration accounts depend on the availability of the RADIUS server and any related resources. If
these resources are not available, accounts cannot be authenticated and a login does not succeed.
For information about using Active Directory to manage and authenticate administration accounts, see the Technical Report
Using
Active Directory for Account Authentication to a PS Series Group
on the customer support website.
For other RADIUS implementations, see your RADIUS server documentation for information about setting up the RADIUS server and
configuring
vendor-specific
attributes (VSAs).
You can use multiple RADIUS authentication servers for increased availability.
RADIUS Attributes for Administration Accounts
A RADIUS server uses attributes to authorize accounts as group administrator, pool administrator, volume administrator, or read-only,
and to store account contact information.
For security reasons, Dell recommends that you require
vendor-specific
attributes. See your RADIUS server documentation for
information on how to set attributes.
For each account, you must set the
Service-Type
attribute to one of these values:
EQL-Admin-Privilege
—Specifies
that the account is either a group administrator account, a pool administrator account, or
a volume administrator account. If you do not specify the
EQL-Admin-Privilege
attribute, the account defaults to group
administrator.
NAS-Prompt
—Specifies
that the account is a read-only account.
In addition, you must
configure
vendor-specific
attributes (VSAs) for each account if you meet one of these conditions:
You want to create a pool administrator account. You must specify the
EQL-Admin-Privilege
attribute and the
Admin-
Pool-Access
attribute.
You want to create a volume administrator account. You must specify the
EQL-Admin-Privilege
attribute, the
Admin-
Pool-Access
attribute, and (optionally) the
Admin-Repl-Site-Access
attribute.
NOTE: A replication quota must be included inside the
Admin-Repl-Site-Access
attribute for authentication to
work properly.
You want to create a read-only account. You must specify the
EQL-Admin-Privilege
attribute and the
Admin-Account-
Type
attribute.
60
About Group-Level Security