Access rights and levels – Avocent CCM User Manual

Page 42

Advertising
background image

28 CCM Installer/User Guide

To add a user:

Issue a User Add command.

USER ADD <username> [PASSWORD=<pwd>] [SSHKEY=<keyfile>] [FTPIP=<ftpadd>]
[KEY=<sshkey>] [ACCESS=<access>] [GROUP=<group1>[,<group2>...]]

You must specify a username. You must also specify a password or SSH user key information, or
you may specify both. You may also include an access level/access rights and group names. For
more information, see Using SSH on page 20, Access rights and levels on page 28, User Add
command
on page 87
and Port groups on page 15.

To change a user’s configuration information:

Issue a User Set command.

USER SET <username> [PASSWORD=<pwd>] [SSHKEY=<keyfile>] [FTPIP=<ftpadd>]
[KEY=<sshkey>] [ACCESS=[+|–]<access>] [GROUP=[+|–]<group1>[,<group2>...]]

You may change your own password at any time. You must have USER access rights to change
another user’s password or to change any user’s SSH user key information and access rights.
To remove an SSH user key or password, specify Key=“” or Password=“”. You cannot remove
both the password and the SSH key from a user’s definition; one must remain in the user database.
Also, you cannot remove a user’s key or password if that removal would result in no valid users
having USER access rights.
For more information, see Using SSH on page 20, Access rights and levels on page 28 and User Set
command
on page 89.

To delete a user:

Issue a User Delete command.

USER DELETE <username>

For more information, see User Delete command on page 88.

To display user configuration information:

1. To display information about one user, issue a Show User command, specifying the username.

SHOW USER <username>

2. To display information about all users, issue a Show User command with the All parameter.

SHOW USER ALL

For more information, see Show User command on page 83.

Access rights and levels

Most CCM appliance commands require the user to have the appropriate permission to issue CCM
appliance commands. Permissions are expressed as access rights or access levels. The access
rights/levels for each command are listed in Table 4.4 on page 47. Table 3.4 describes the access
rights a user may be given.

Advertising