Fujitsu DX80 S2/DX90 S2 Computer Drive User Manual


  Open as PDF
of 1066
 
Chapter 11 System Management
11.2 Functions in the Action Area for System
ETERNUS Web GUI User’s Guide
Copyright 2013 FUJITSU LIMITED P2X0-1090-10ENZ0
864
4 Click the [Done] button to return to the [Define Role] screen.
End of procedure
11.2.7.4 Add Role
This function combines several user policies and creates a user-specific role (custom role).
Up to 20 roles can be created per storage system.
Policy
The 14 types of access privileges shown below are available.
An error screen appears if the specified IP address of the RADIUS server conflicts with the internal IP
address of the ETERNUS DX Disk storage system.
Policies Description
Status Display Status display functions (storage system status, RAID group list, volume list,
copy session list, etc.)
RAID Group Management RAID group, Thin Provisioning Pool, ECO mode, hot spare disk setting
functions, etc.
Volume - Create / Modify Volume setting functions (register/modify/expand), etc.
Volume - Delete / Format Volume setting functions (delete/format), etc.
Host Interface Management Host interface management functions (host group settings, port group
settings, LUN group settings, host affinity settings), etc.
Advanced Copy Management Local Advanced Copy setting functions, Remote Advanced Copy setting
functions, etc.
Copy Session Management Advanced Copy session management functions (start/stop/delete), etc.
Storage Migration Management Storage Migration setting functions (start/suspend/stop/restart/delete path),
etc.
Storage Management Configuration setting functions of the ETERNUS DX Disk storage system (date
and time, network, remote support), etc.
User Management User account setting functions (create/change/delete), etc.
Authentication / Role External authentication and role setting functions (create/change/delete),
etc.
Security Setting Encryption setting functions of drives, etc.
Maintenance Information Exporting and deleting functions of maintenance information (performance
information, configuration information, events, storage system logs, panic
dumps), etc.
Maintenance Operation Maintenance operation/preventive maintenance operation of hardware and
firmware
A role without any user policies cannot be created.