Fujitsu DX8100 S2 Manual Do Utilizador

Página de 1066
Chapter 11  System Management
  11.2  Functions in the Action Area for System
ETERNUS Web GUI User’s Guide
Copyright 2013 FUJITSU LIMITED
P2X0-1090-10ENZ0
864
4
Click the [Done] button to return to the [Define Role] screen.
End of procedure
11.2.7.4
Add Role
This function combines several user policies and creates a user-specific role (custom role).
Up to 20 roles can be created per storage system.
Policy
The 14 types of access privileges shown below are available.
An error screen appears if the specified IP address of the RADIUS server conflicts with the internal IP 
address of the ETERNUS DX Disk storage system.
Policies
Description
Status Display
Status display functions (storage system status, RAID group list, volume list, 
copy session list, etc.)
RAID Group Management
RAID group, Thin Provisioning Pool, ECO mode, hot spare disk setting 
functions, etc.
Volume - Create / Modify
Volume setting functions (register/modify/expand), etc.
Volume - Delete / Format
Volume setting functions (delete/format), etc.
Host Interface Management
Host interface management functions (host group settings, port group 
settings, LUN group settings, host affinity settings), etc.
Advanced Copy Management
Local Advanced Copy setting functions, Remote Advanced Copy setting 
functions, etc.
Copy Session Management
Advanced Copy session management functions (start/stop/delete), etc.
Storage Migration Management
Storage Migration setting functions (start/suspend/stop/restart/delete path), 
etc.
Storage Management
Configuration setting functions of the ETERNUS DX Disk storage system (date 
and time, network, remote support), etc.
User Management
User account setting functions (create/change/delete), etc.
Authentication / Role
External authentication and role setting functions (create/change/delete), 
etc.
Security Setting
Encryption setting functions of drives, etc.
Maintenance Information
Exporting and deleting functions of maintenance information (performance 
information, configuration information, events, storage system logs, panic 
dumps), etc.
Maintenance Operation
Maintenance operation/preventive maintenance operation of hardware and 
firmware
A role without any user policies cannot be created.