Security Command R500 Guide de l'utilisateur Page 39

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 62
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 38
User Permissions for Using CIM/WBEM Features
The following table shows the user permissions for using CIM/WBEM features,
based on the Device Manager permissions and executable CIM methods.
Table 1-6 User Permissions for Using CIM/WBEM Features
Device Manager Permissions Executable CIM Methods Resource
Group
Admin Modify View Peer
(see Note)
Service Methods CIM Operations
Yes Yes Yes -- Permitted Permitted All Resources
-- Yes Yes -- Permitted Permitted
-- -- Yes -- Not permitted Permitted
-- -- -- Yes Not permitted Permitted
Yes Yes Yes -- Not permitted Not permitted
-- Yes Yes -- Not permitted Not permitted
-- -- Yes -- Not permitted Not permitted
User-defined
resource
groups
-- -- -- Yes Not permitted Permitted
Legend:
Yes: Has corresponding Device Manager permissions
—: Does not have corresponding Device Manager permissions
Permitted: Execution of corresponding CIM methods is permitted
Not permitted: Execution of corresponding CIM methods is not permitted
Note: For Peer Device Manager permissions, users are treated as All
Resources users, even when they belong to a user-defined resource
group, due to Device Manager server processing.
Overview and Setup of CIM/WBEM 1-27
Hitachi Device Manager SMI-S Provider Installation and User Guide
Vue de la page 38
1 2 ... 34 35 36 37 38 39 40 41 42 43 44 ... 61 62

Commentaires sur ces manuels

Pas de commentaire