Setting authentication methods – HP StorageWorks 2.32 Edge Switch User Manual

Page 87

Advertising
background image

Edge Switch Element Manager user guide

87

If you applied the same user settings to multiple products, the product list displays multiple

product names that were selected from the Apply To dialog box. By default, the product that was

selected from the top table for configuration is highlighted. The content of Detailed Changes

table changes as you click through different products from the product list.
The differences between the to-be-populated setting and current settings on each individual

product are displayed, because the Apply To dialog box takes changes made on user settings

for one product, and generalizes them to multiple products whose user settings can be totally

different. The new settings replace the existing settings on other products.
To thoroughly check the new changes, click the different products on the product list and view

the detailed changes.

NOTE:

Populating user related settings to multiple products, causes the new settings to override the

existing settings completely.

Clicking Start causes HAFM to populate changes to the switch or director specified in the

products list. Close is always enabled. If the user clicks on the Close button during the process, a

message is displayed to ask the user whether to abort the changes or not.
The bottom Status window displays the status of each product. If all changes are successfully

populated to a product, the status displays the product name and a successful message.
If there are no security settings being changed, the Security Change Confirmation and Status is

displayed with the Detailed Changes table displaying a message that no changes were found.

Clicking Start displays a Status window message that the security settings are identical and that

there are no changes to apply.

Setting Authentication Methods

Several tabs require you to specify the method the switch or director uses to authenticate the user’s

credentials, Local Only, Radius then Local, and Radius Only.

NOTE:

In this context, a user can be a user, a software ID, or another device.

Local Only—Each switch or director uses its local user database for authentication.

Radius then Local—the switch or director uses the Radius server, if available, to authenticate

users. If the Radius server is not available, then the local database is used.

Radius Only—Radius server is used to authenticate users. If the Radius server is not available,

then users cannot connect. Radius is acknowledged as being an industry standard and is

convenient to use because all passwords can be managed from a central location. There are

some disadvantages. Note the following:
• If a Radius Only method is used, the ability to authenticate is directly related to the quality of

the IP network being used to communicate with the Radius server. If you are authenticating

E_Ports, the stability of the fabric is dependent on the stability of the IP network. The risk is

smaller, if you use Radius then Local or Local Only.

Advertising
This manual is related to the following products: