Modifying a user

You can change properties and settings for either a local or remote user of a SAN Volume Controller cluster.

You must have security administrator role to create, delete, or modify local and remote users.

This task assumes that you have already launched the SAN Volume Controller Console. To change the properties of either a local or remote user, complete the following steps:

  1. Click Manage Authentication > Users in the portfolio. The Viewing Users panel is displayed.
  2. Select the user that you want to change and select Modify a User from the task list. Click Go. The Modifying a User panel is displayed.
  3. You can change the following credentials for the selected user:
    New Name
    Enter the new name of the selected user. The user name cannot start or end with a blank character. The user name can consist of a string of 1 - 256 ASCII characters with the exception of the following characters: %:",* '. This field is required.
    Password
    Enter a password for the user. The password cannot start or end with a blank character. The password can consist of a string of 6 - 64 ASCII characters. The following characters are not allowed: %:",* '. To confirm the new password, re-enter the password. You can also select Remove Password to remove the password for the current user.
    SSH Key Public File
    Enter the SSH key file that is associated with the user. Click Browse to select the file. An SSH key is needed if this user plans to use the command-line interface to manage the cluster. You can select Remove SSH Public Key to remove the SSH public key from the user.
    Authentication Type
    Select the authentication type for the selected user. Select Remote if the user is authenticated to the cluster by anremote authentication service. Select Local if the user is authenticated by the cluster.
    User Group
    Select the user group that you want the user to belong to.User groups allow you to manage authenticated users into groups based on their access level or role. The role determines the access to cluster functions for the users in the group.
  4. Click OK.
Library | Support | Terms of use | Feedback
© Copyright IBM Corporation 2003, 2009. All Rights Reserved.