Jump to content English
hp.com home
HP Systems Insight Manager  |  Administering the Software  |  Users and Authorizations

Administering the Software
Users and Authorizations

» HP Systems Insight Manager

»Table of Contents
»Index
»Product Overview
»Getting Started
»Monitoring Systems, Events, and Clusters
»Using Tasks
»Using Default Tools
»Reporting
»Administering the Software
Users and Authorizations
»Users
»Backing Up and Restoring the Database
»Toolboxes
»System Groups
»Authorizations
»Managed Systems
»Audit Log
»Clusters
»Events
»Networking and Security
»Server Certificates
»Trusted Certificates
»Identification
»Filtering
»Discovery
»Status Polling
»Data Collection
»Protocols
»WMI Mapper Proxy
»Manage System Types
»Version Control Repository
»Troubleshooting
»Printable Version
»Glossary
»Using Help
Content starts here
» Introduction
» User Configuration Rights
» Users and Authorizations
» Related Procedures
» Related Topics

Users that have been added to the central management server (CMS) are unable to view systems or manage systems until authorizations have been configured for them.

HP-UX and Linux provided command line tools, such as ls and df, are run as root by default. For security reasons, you might want them to run as a specific user to avoid permitting unintended capabilities to a user.

Introduction

HP Systems Insight Manager enables you to configure authorizations for specific users or groups of users. Each user is authorized with a toolbox on a system or group of systems.

It is important that you plan what systems each user is going to manage and which specific set of tools the users are authorized to execute against the managed systems.

Refer to these general steps as a guideline for setting up user names and authorizations:

User Configuration Rights

HP Systems Insight Manager provides the following configuration rights:

  • Full configuration rights. Allows the user total control of the database. Users can run Discovery of systems and Data Collection; define users and authorizations; set Cluster Monitor configuration; configure licensing and protocol settings; and create, modify, delete, and run reports, snapshot comparisons, tools, custom commands, events, automation tasks, and so on.

  • Limited configuration rights. Enables the user to create, edit , and delete reports (including pre-defined reports). Users can also create new single-system aware (SSA) tools and Web-launch aware (WLA) tools. These tools remain owned by that user, which means they have restricted authorizations. As owner of the tool, they can edit or delete the tool, and the tool can only be a member of the All Tools toolbox.

  • No configuration rights. Enables the user to view and run pre-defined reports on systems they have been authorized to view only. A user with no configuration rights cannot execute any actions to affect the system database.

Users and Authorizations

The Users and Authorizations tabs offer the following options:

  • Add, edit, and delete users, and view and print user reports. Select OptionsSecurityUsers and AuthorizationsUsers.

  • Add, edit, and delete toolboxes, and view and print toolbox reports. Select OptionsSecurityUsers and AuthorizationsToolboxes.

  • Add, edit, and delete system groups, and view and print system group reports. Select OptionsSecurityUsers and AuthorizationsSystem Groups.

  • Add and delete authorizations, and view and print authorization reports. Select OptionsSecurityUsers and AuthorizationsAuthorizations.

Related Procedures

» Users - Creating New Users
» Toolboxes - Creating New Toolboxes
» System Groups - Creating New System Groups
» Authorizations - Creating New Authorizations
» Users - Editing User Accounts
» Toolboxes - Editing Toolboxes
» System Groups - Editing System Groups
» Users - Deleting User Accounts
» Toolboxes - Deleting Toolboxes
» System Groups - Deleting System Groups
» Authorizations - Deleting Authorizations
» Users - User Report
» Toolboxes - Toolbox Report
» System Groups - System Group Report
» Authorizations - Authorization Report

Related Topics

» Administering the Software - Users
» Administering the Software - Toolboxes
» Administering the Software - System Groups
» Administering the Software - Authorizations