Use the following information to manage DSC - SP2000 user accounts.
Only the ROOT user can add or delete system users. Any new system users that are created (added) are automatically assigned a read-only access to the system (UNPROFILED). For information about user profiles and privileges, see DSC User Profiles and Privileges.
The Create button on the Unprofiled screen cannot create unprofiled users.
It is recommended that the ROOT user adds all system users with the appropriate user profile and provides these users with initial passwords. For information about password restrictions, see DSC Password Management.
User names are less than or equal to 31 characters. User names can contain alphanumeric, period, and hyphen characters.
The system logs the actions of the user and records that user's name into the audit log.
User names cannot have
See the following examples of valid user names that have period or hyphen characters:
Start
Click Add User. Enter the information as required.
Three options are available for User Type:
Click Continue. You are prompted to confirm the changes.
To add an SFTP user, click the checkbox next to SFTP User.
Start
Start
You cannot delete a user who is signed onto the system
To enable or disable SSH access for ROOT users:
Start
ROOT ssh access is set to enabled by default to allow for installation and upgrades to avoid any interruptions. Root access is still available through console and Web UI regardless of the setting.
When ROOT ssh access is set to disabled, ROOT cannot ssh login to the system. If ROOT ssh access is set to disabled, users can login to the system through ssh and then su to root if needed to perform linux operations and/or commands.
Non-ROOT users can view the User Settings page and the options selected, but cannot make any changes.
To allow for password-less connections:
Start
Any system user added by the ROOT user is defined as a non-root user. Non-ROOT users that are assigned a user profile are granted certain privileges on the system.
An SFTP user is granted inbound SFTP access to the system and possesses the following abilities: