EasyManuals Logo

EMC Symmetrix DMX-3 User Manual

EMC Symmetrix DMX-3
326 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #184 background imageLoading...
Page #184 background image
184
EMC Symmetrix DMX-3 Product Guide
Data Integrity, Availability, and Protection
For additional granularity, user-based authorization provides an tool
for restricting the management operations to individual users.
User-based authorization and Access Control’s host-based
authorization are independent utilities that can be used either
individually or —for enhanced security—in tandem. User
authorization is managed using SMC or the SYMCLI symauth
command.
With user Authorization, a username can be mapped to a specific
role, which defines the operations that they are permitted to perform
on the Symmetrix array. User Authorization is configured
independently for each Symmetrix array. A Role is a pre-defined set
of permissions, or access types, that determine what operations a user
can perform. Unlike host-based access control, a user is assigned a
particular Role for the entire Symmetrix array rather than for
individual logical devices or classes of devices. Roles are predefined
in Solutions Enabler and cannot be modified.
For each Symmetrix array, a given user can only be assigned a single
role as follows:
◆ None — No actions authorized.
◆ Monitor — Able to perform read-only (passive) operations on a
Symmetrix array, excluding the ability to read the audit log or
Access Control definitions.
◆ Storage Admin — Able to perform all management operations on
a Symmetrix array and modify GNS group definitions in addition
to all Monitor operations.
◆ Admin — Able to perform all operations on a Symmetrix array,
including security and Monitor operations.
◆ Security Admin — Able to perform security operations
(symaudit, symacl, symauth) on a Symmetrix array in addition to
all Monitor operations.
◆ Auditor — Grants the ability to view, but not modify, security
settings for a Symmetrix array (including reading the Symmetrix
Audit Log, symacl list and symauth) in addition to all Monitor
operations. This is the minimum role required to view the
Symmetrix Audit Log.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the EMC Symmetrix DMX-3 and is the answer not in the manual?

EMC Symmetrix DMX-3 Specifications

General IconGeneral
BrandEMC
ModelSymmetrix DMX-3
CategoryStorage
LanguageEnglish

Related product manuals