Veritas Access Appliance Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Using Access Appliance as an Object Store server
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Section VI. Monitoring and troubleshooting
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Configuring event notifications and audit logs
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Access Appliance continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring episodic replication
- Section X. Reference
About the naming requirements for adding new users
The following table provides the naming requirements for adding new Access Appliance users.
Table: Naming requirements for adding new users
Guideline | Description |
---|---|
Starts with | Must begin with an alphabetic character and the rest of the string should be from the following character set: [a-zA-Z0-9_-] Can start with an underscore (_). |
Length | Can be up to 31 characters. If user names are greater than 31 characters, you get the error, "Invalid user name". |
Case | Access Appliance CLI commands are case-insensitive (for example, the user command is the same as the USER command). However, user-provided variables are case-sensitive (for example, the username Primary1 is not the same as the username PRIMARY1). |
Can contain | Hyphens (-) and underscores (_) are allowed. |
Note:
Each user account needs a password for authentication. The following special characters are not supported in the user password: ` (backtick), : (colon), ; (semicolon), " (double quote), ' (single quote), ( (opening parenthesis), ) (closing parenthesis), ? (question mark), * (asterisk), white space (blank), \ (back slash), / (forward slash).
When the STIG option is not enabled, the following password requirements must be met:
The password must contain at least eight characters.
The password must contain at least one lowercase character (a-z), uppercase character (A-Z), numeric character (0-9), and special character (!#$%&+,-.<=>@[]^_{|}~).
The password cannot be a Dictionary word.
The last seven passwords cannot be reused, and the new password cannot be similar to the previous passwords.
When the STIG option is enabled, the following password requirements must be met:
The password must be at least 15 characters long and must include at least one character from the following categories:
Numbers
Lowercase characters
Uppercase characters
Special characters (!#$%&+,-.<=>@[]^_{|}~)
The password can contain a maximum of two consecutive repeating characters.
The password can contain a maximum of four consecutive repeating characters from the same category.
The password must contain a minimum number of eight different characters.
The password must be retained for a minimum of one day before you change it.
The password must be changed after a maximum of 60 days.
The password cannot be a Dictionary word.
The last seven passwords cannot be reused.
The new password must have at least eight characters that are different from the old password.