
Roles
More than one role is readily available. You cannot create custom roles. The following table shows
the roles and permitted operations.
Permitted operationsRole
• Viewing information about user accounts and encryption keys
Security Administrator (View Only)
Security Administrator (View & Modify)
• Configuring user accounts
• Creating encryption keys and configuring encryption settings.
• Configuring the certificate used for the SSL communication
• Configuring the Fibre Channel authentication (FC-SP)
• Configuring resource groups
• Viewing audit log information and downloading audit logs
Audit log Administrator (View Only)
• Configuring audit log settings and downloading audit logs
Audit log Administrator (View & Modify)
• Viewing storage system information
Storage Administrator (View Only)
Storage Administrator (Initial Configuration)
• Configuring settings for storage systems
• Configuring settings for SNMP
• Configuring settings for e-mail notification
• Configuring settings for license keys
• Viewing, deleting, and downloading storage configuration reports
Storage Administrator (System Resource
Management)
• Configuring settings for CLPR
• Configuring settings for MP Blade
• Deleting tasks and releasing exclusive locks of resources
• Completing SIMs
• Configuring attributes for ports
• Configuring LUN security
• Configuring Performance Control
Storage Administrator (Provisioning)
• Configuring caches
• Configuring LDEVs, pools, and virtual volumes
• Formatting and shredding LDEVs
• Configuring external volumes
• Configuring alias volumes for Parallel Access Volumes
• Configuring Thin Provisioning
• Configuring ESAM
• Configuring LUSE
• Configuring host groups, paths, and WWN
• Configuring Auto LUN, except splitting Auto LUN pairs when using
RAID Manager
• Configuring access attributes for LDEVs
• Configuring LUN security
Storage Administrator (Performance
Management)
• Configuring monitoring
• Starting and stopping monitoring
Storage Administrator (Local Copy)
• Performing pair operations for local copy
34 Setting up and managing user accounts
Komentarze do niniejszej Instrukcji