74 007-5510-002
Figure 3–50 Edit Zoning Configuration Screen
3.4.3 User Authentication
The controller creates correspondence between users (World Wide Name or GUIDs), storage LUNs, and
permissions. The system can store configurations for up to 512 users in total, and the settings apply to
all host ports.
Each authorized user will only have access to their own and “allowed-to-share” data determined by their
customized LUN identification scheme. Administrators can also restrict users’ access to the host ports
and their Read/Write privileges to the LUNs. Unauthorized users will be given the “host port zoning”
rights as defined in Section 3.4.2,"Zoning (Anonymous Access)".
USER displays the current settings for all authorized users
(Figure 3–51). Each user is identified by their
64-bit World Wide Name (or GUID) and is given a unique user ID number. The Ports column indicates
which host ports, on each controller, the user is allowed. The LUN Zoning chart indicates which internal
LUNs the user will have access to (with read-only and read/write privileges), and where the internal LUN
is displayed to the user.
Figure 3–51 User Settings Screen
To configure/change the settings, use these commands:
• USER ADD adds a new user and defines the user’s access rights
• USER EDIT edits the access rights of an existing user
• USER DELETE deletes an existing user from the system.
See Section 2.3.9, "Setting Security Levels", subsection entitled User Authentication (Recommended
for SAN Environment) for further information on how to add a new user.