Jump to content English
hp.com home
HP Systems Insight Manager  |  Administering the Software  |  Users  |  Editing User Accounts

Users
Editing User Accounts

» HP Systems Insight Manager

»Table of Contents
»Index
»Product Overview
»Getting Started
»Monitoring Systems, Events, and Clusters
»Using Tasks
»Using Default Tools
»Reporting
»Administering the Software
»Users and Authorizations
»Users
»Creating New Users
Editing User Accounts
»Deleting User Accounts
»User Report
»Backing Up and Restoring the Database
»Toolboxes
»System Groups
»Authorizations
»Managed Systems
»Audit Log
»Clusters
»Events
»Networking and Security
»Server Certificates
»Trusted Certificates
»Identification
»Filtering
»Discovery
»Status Polling
»Data Collection
»Protocols
»WMI Mapper Proxy
»Manage System Types
»Version Control Repository
»Troubleshooting
»Printable Version
»Glossary
»Using Help
Content starts here
» Command Line Interface
» Related Procedures
» Related Topics

In the event a user account must be modified, you can modify it from the Users tab on the Users and Authorizations page.

To modify a user account:

  1. Select OptionsSecurityUsers and AuthorizationsUsers.

  2. Select the user account you want to edit and click [Edit]. The Edit User section is displayed.

  3. Change the appropriate setting.

    1. In the Login name (on central management server) field, enter the operating system login for the central management server (CMS). This is a required field.

    2. In the Domain (Windows® domain for login name) field, enter the Windows domain name for the login name if running a Windows operating system.

    3. In the Full name field, enter the users full name.

    4. In the Phone number field, enter the users phone number.

    5. In the E-mail address field, enter the users e-mail address.

    6. In the Central management server configuration rights section, select the level of authority to assign to the new user from the following options:

      • full, allowed to modify all central management server settings. Enables the user total control of the database. Users can run Discovery of systems and Data Collection; define users and authorizations; set Cluster Monitor configuration; configure licensing and protocol settings; and create, modify, delete, and run reports, snapshot comparisons, tools, custom commands, events, automation tasks, and so on.

      • limited, allowed to create/modify/delete all reports and their own tools. Enables the user to create new reports, edit any reports, and delete any reports (including the pre-defined reports). Users can also create new single-system aware (SSA) tools and Web-launch aware (WLA) tools. These tools remain owned by that user, which means they have restricted authorizations. As owner of the tool, they can edit or delete the tool, and the tool can only be a member of the All Tools toolbox.

        CAUTION: If a user has been changed from a full configuration rights user to a limited configuration rights user, you might want to change the users authorizations. Otherwise, the limited configuration rights user still has authorizations for All Tools toolbox on All Managed Systems and the All Tools toolbox on the CMS.

      • none, no configuration of central management server allowed. A user with no configuration rights cannot execute any actions to affect the system database. This enables a user to view and run pre-defined reports on systems they have been authorized to view only.

        CAUTION: If a user has been changed from a full configuration rights user to a user with no rights, you might want to change the users authorizations. Otherwise, the no configuration rights user still has authorizations for All Tools toolbox on All Managed Systems and the All Tools toolbox on the CMS.

      Refer to Users - Creating New Users for more detailed information on each level of authority.

    7. Under the Login IP Address Restrictions section, in the Inclusion ranges field, enter the IP addresses of the systems that you want included for management by this user. If you list multiple IP addresses, separate them with a semi-colon (;). Each range is a single IP address or two IP addresses separated by a dash (-). The IP addresses must be entered in the standard dotted form, for example 15.1.54.133. Any spaces surrounding the semi-colons or dashes are ignored. Spaces are not allowed within a single IP address in dotted form.

    8. In the Exclusion ranges field, enter the IP address of the systems that should be excluded from management by this user. Use the same format in the previous step for Inclusion ranges. Enter 0.0.0.0 to prevent a user from logging in through a remote system.

      Note: Be sure to verify that your inclusion and exclusion ranges do not overlap.

    9. Note: The following five steps are for Windows systems only.

      Under the Pager Information section, in the Phone number field, enter the pager phone number of the user associated with this user account if you are using a Windows operating system. If the Phone number field is left blank, the paging information is not saved.

    10. In the PIN number field, enter the PIN number associated with the pager phone number.

    11. In the Message length field, select how many characters can be accepted in the paging message from the dropdown list.

    12. In the Baud rate field, select the appropriate baud rate for the pager from the dropdown list.

    13. In the Data format field, select the appropriate data format for the pager from the dropdown list.

  4. Click [OK] to save and close the New User section. You can click [Apply] to save and keep the Edit User section open, or click [Cancel ]to cancel the modifications.

    The user changes are saved.

Command Line Interface

Users with full configuration rights can use the mxuser command to modify users from the command line interface (CLI). Users with limited configuration rights can use the mxtool command only on single-system aware (SSA) and Web-launch aware (WLA) commands they have access to. For assistance with this command, refer to the HP-UX or Linux manpage by entering man mxuser at the command line.

Users with limited configuration rights can use the mxexec command to launch command tools on one or more systems from the command line interface. For assistance with this command, refer to the associated manpage.

Refer to Getting Started - Using Command Line Interface Commands for information on accessing the manpage.

Related Procedures

» Administering the Software - Users and Authorizations
» Users - Creating New Users
» Users - Deleting User Accounts
» Users - User Report

Related Topics

» Administering the Software - Users and Authorizations
» Administering the Software - Users