In this section:
User Management provides new tools for creating and editing user accounts.
On SBC main screen, go to Administration > Users and Application Management > User and Session Management. The User and Session Management window is displayed.
This section helps you to understand the number of sessions currently opened and the list of users currently working on EMA. The name of the user and the IP address from which they are accessing EMA is also provided.
Click Delete against any user name to remove the user from the list.
If the web browser crashes, hangs or is manually closed while logged into the EMA GUI, the EMA session will still remain open. Manual intervention by the administrator is required to terminate the session from the EMA GUI. To terminate a user session, click the "x" icon at the far right of the user session entry.
This section helps you to understand the number of Netconf sessions currently opened along with the Session ID and the Session State.
To terminate a Netconf session that is not locked, click the "x" icon at the far right of the Netconf session entry.
EMA provides an the option to create new user too.
Click New User on the User and Session Management panel.
The Create User window appears:
User
: Enter the name of user to be created. A valid user name:can contain only . @ _ - + : special characters
The characters #%^&(){}<>,/\;`[]=!$'*?|~ are not allowed.
Role
: Specify the type of Role to be assigned to this user. The options are:
Administrator
: Read-write access to all commands and data spaces, except the Field Service shell.
Calea
: Read-write access to Lawful Intercept tables, and Read access to other tables. Only Admin user can add/remove user from this group. Only one user named “calea” is allowed in this group, and “calea” user cannot be part of any other group.FieldService
: Read-write access to all commands and data spaces. Also, they have access to the Field Service shell containing system debug commands including the ability to access the Linux shell login prompt. Field service does not have access to Security, Event logs and Management Audit Logs and cannot execute any commands stopping or starting these audit log services.Guest
: Read-only access to all commands and data spaces, except commands that deal with user accounts, logging and audit controls, TOD clock and sensitive administrative items. They do not have access to the Field Service shell, Security Event logs, and Management Audit Logs.Operator
: Read-write access to all commands and data spaces, except commands that deal with user accounts, logging and audit controls, TOD clock, and sensitive administrative items. They do not have access to the Field Service shell, Security Event logs, and Management Audit Logs and cannot execute any commands stopping or starting these audit log services.SecurityAuditor
: Access only to the security logs that are generated in SBC. SBC allows the creation of user of type Security Auditor
via CLI and EMA. The SecurityAuditor
will have a read-only access to view the security and management audit logs.Enter the following options:
Allow Interactive Access (CLI and EMA)
: Enable this flag to allow the user to access interactive interfaces such as CLI/EMA.Allow Machine to Machine Access (REST)
: Enable this flag to allow the specified user machine-to-machine access to REST API.Account Expiration Enabled
: If checked, the current user account expires as per the account expiration parameters set in the Application Management window. As per the parameter rules set in the Application Management window, an account can expire in either of the following conditions:Password Expiration Enabled
: If checked, the current account will have the password expiry duration after which the user has to create a new password to login. The duration is set in the Application Management window. For more information, refer to Users and Application Management - Application Management.Account Enabled
: If checked, the account will be enabled immediately.Access Type
: Specifies the type of access that should be given to this user. The options are:Public Key Only (CAC Card)
: The user can login only with U.S. Department of Defense's Common Access Card (CAC) for authentication.Password and Public Key
: The user can login with the provided password along with the U.S. Department of Defense's Common Access Card (CAC) for authentication.
Any user created, will have an auto generated password. This password is set to Expire status and has to be changed at the login in-order to continue to use the account.
Once you successfully change the password for any user, you are not allowed to change it again on the same day. Only the password for an admin user can be changed more than once on the same calendar day.
The Access Permissions, Roles and account related information can be modified for all the existing users.
"Call Trace User" is a special category User for which the edit and the password will not be supported.
On the User Management screen, in the view pane, highlight the account which you would like to edit.
The Edit User window appears:
You can modify the following fields:
Role
: You can the role of the existing user based on the option you choose for this field. For a list of available roles, refer to Create User section in the same page.Allow Interactive Access (CLI and EMA
): Enable this flag to allow the user to access interactive interfaces such as CLI/EMA.Allow Machine to Machine Access (REST)
: Enable this flag to allow the specified user machine-to-machine access to REST API.Account Expiration Enabled
: If unchecked, the account will not have any expiration duration.Password Expiration Enabled
: If unchecked, the password for this account will not have any expiration duration.Account Enabled
: If unchecked, the account will not enabled and can not be used.Access Type
: Either one of the the type has to be selected.
You can not edit the name of the user.
The Administrator can reset the password of all the users.
Click to reset the password of the selected user. The Temporary password for that user is created and displayed in the same window.
Use this temporary password to log on to SBC. Once you have logged in, you need to change your password again.
To know more about rules to set your password, refer to System - Admin - Password Rules.