Hp Secure Key Manager User Manual Page 140

  • Download
  • Add to my manuals
  • Print
  • Page
    / 352
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 139
Figure 64 Viewing the Local Users section
The following table describes the components of the Local Users section.
Table 45 Local Users section components
DescriptionComponent
This is the name of the user. The username must begin with a letter, it must be between
1 and 64 characters (inclusive), and it can consist of letters, numbers, underscores
(_), periods (.), and hyphens (-).
Username
The password for the local user. The requirements for the local user password depend
on your Password Management Settings. For information on password requirements,
refer to Password Constraints. The maximum password length is 64 characters. The
passwords displayed on the Local Users section are masked with eight asterisks (*).
When changing the password, you should clear this field before entering the new
password. If you do not clear this field, the asterisks become a part of the new pass-
word.
Password
When selected, this user can create, modify, and delete users and groups via the
XML interface. This permission also allows a user to modify his or her own user per-
missions. Users with the User Administration Permission value selected automatically
have the Change Password Permission.
User Administration
Permission
When selected, this user can change his or her own password via the XML interface.
Users with User Administration Permission selected automatically have the Change
Password Permission.
Change Password
Permission
Click Edit to change the password or the permissions for a user.Edit
Click Add to add a user.Add
Click Delete to delete a user.Delete
Click Properties to access the Selected Local User page.Properties
User Administration Permission
You should be extremely cautious in assigning the User Administration Permission. Its use should be
reserved for situations where you want to perform user administration programmatically using the
XML interface of the KMS Server (as opposed to the Management Console). In such deployments, the
User Administration Permission should be given to a very small number of users. Most users should
not be given this permission.
Using the Management Console140
Page view 139
1 2 ... 135 136 137 138 139 140 141 142 143 144 145 ... 351 352

Comments to this Manuals

No comments