Configuring the System Administrators
Configuring the system administrators helps guarantee the ATIC Management center and data security more effectively.
- Introduction to System Administrators
Configuring the system administrators can implement the configuration of system security policy, permission/domain-specific management of the ATIC Management center, restriction to the IP addresses that access the ATIC Management center, and can monitor and manage online administrators in real time.
- Managing Administrators
The system provides one default administrator admin. The default administrator has all permissions, can manage all resources, and can log in the ATIC Management center from any IP addresses. To implement permission/domain-specific management of the ATIC Management center, you can create administrators and modify, lock, unlock, or delete them.
- Managing Administrator Groups
Different administrator groups have different permission sets. You need to select the owning administrator group for the administrator to be created, so that the administrator can obtain the permissions on this administrator group. The ATIC Management center provides three default administrator groups, namely the administrator, operator, and auditor groups. These three default administrator groups are not allowed to modify or delete.
- Managing Online Administrators
To prevent the login of an illegal administrator to the ATIC Management center, you can monitor the online administrators in real time and forcibly log off the illegal administrators.
- Configuring the System Security Policy
The system security policy contains the password policy, login policy, and session timeout duration. Configuring the system security policy can improve the system security.
- Configuring the Authentication Server
The authentication server needs to be correctly configured if administrator authentication uses the Remote Authentication Dial-In User Service (RADIUS).
Copyright © Huawei Technologies Co., Ltd.