Access Appliance Online Help
- Getting started
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- About the NFS shares
- About S3 buckets for NetBackup
- Managing storage
- Managing file sharing services
- Monitoring and troubleshooting
- Provisioning and managing file systems
- Creating a file system
- Configuring a replication job
- Provisioning and managing shares
- Managing policies
- Managing settings
- About replication
- About Access Appliance product licensing
- About the File Transfer Protocol
- About Veritas Data Deduplication
- About alert management
About user management
Access Appliance enables you to add users for administering your appliance. Your privileges within Access Appliance are based on what user role you have been assigned.
The following table provides an overview of the user roles within Access Appliance.
Table: User roles within Access Appliance
User role | Description |
---|---|
Master | Master has all of the permissions including adding and deleting users, displaying users, and managing passwords. Only the Masters can add or delete other administrators. |
Vxdefault | A vxdefault user role does not have any privilege. If the user role is not specified while creating the user, then the user is created without any privileges and is termed as a vxdefault user. |
You can add local users as well as users from an Active Directory (AD) server and a Lightweight Directory Access Protocol (LDAP) server. The LDAP server should be a Linux/UNIX server. Registering remote users lets you leverage your existing directory service for user management and authentication.
Each user account must authenticate itself with a user name and password to access the appliance. For a local user, the user name and password are managed on the appliance. For a registered remote user, the user name and password are managed by the remote directory service.
To add the different administrator roles, you must have master privilege. After you assign the master role to AD and LDAP users, they can also perform cluster configuration and management using the GUI, Access CLISH, Appliance CLISH and Restful APIs.
When you add a new user role, remember that:
Any user who has been assigned the master role can assign the master role to an AD/LDAP user and groups for managing the configuration.
You can remove the master role for a given AD/LDAP user and groups.
AD/LDAP users without a master role can generate S3 keys.
AD/LDAP users can login even after a console failover or HA scenarios.
Domain is an optional argument with the default value as local.
For the local user, only the username is required.
You can assign only the master role to the LDAP and AD user.
The LDAP username should not be the same as a local username.
For AD, enter
domain\\username
.For LDAP, enter
username
.Veritas recommends that LDAP, AD, and NIS UIDs start from 10000. Otherwise, when you assign a role to the AD/LDAP user, the UID of the local user may conflict with the UID of a user from the directory server.
Nested LDAP group for role assignment is not supported.
The Support account is reserved for Technical Support use only, and it cannot be created by administrators.
To perform user role management using GUI, see See Adding and removing user roles using GUI.
To perform user management using CLISH, see See Performing user management using CLISH.