H3C Technologies H3C Intelligent Management Center User Manual

Page 73

Advertising
background image

64

If no authorization policy is configured for the device user group, the device user group

inherits the authorization policy of its parent group, and this field displays the authorization
policy of its parent group.

{

User Authorization Policy—Name of the authorization policy used by the device user.
Click the authorization policy name to view the authorization policy details (see "

7 Managing

authorization policies

").

If the device user can log in to the device but cannot execute commands on the device, this field
displays CLI Access Not Supported.

If no authorization policy is configured for the device user, this field displays nothing.

If both the device user and its device user group are configured with an authorization policy,
the authorization policy configured for the device user is used.

If no authorization policy is configured the device user, the device user uses the
authorization policy of the device user group.

{

Creation Date—Date when the device user was created, in the format YYYY-MM-DD.

{

Last Logoff—Last time the device user logged off, in the format YYYY-MM-DD hh:mm. If the
device user never logs in to the device, the last offline time is the time when the device user was

created.

{

Expiration Date—Date when the device user expires and becomes invalid, in the format

YYYY-MM-DD. If the device user never expires, this field displays nothing.

{

Max. Online Users—Enter the maximum number of device users allowed to use the same
account name to log in to the device. If no limit is set, this field displays nothing.

{

Enable Privilege-Increase Password—This field indicates whether the privilege-increase
password function is enabled for the device user. With this function enabled, the device user

can use the password to increase the operation privilege.

{

Enable Password Strategy—This field displays Yes or No. If it displays Yes, the requirements of
password strategy must be met when device users change a password. If it displays No, device

users are not controlled by the password strategy when they change a password. The password
strategy does not take effect when TAM operators set passwords for device users. For

information about configuring password strategies, see

12 Configuring global system settings

."

{

Device User Group—Device user group to which the device user belongs.

The Action menu is located next to the Device User details pane. The following actions are
available:

{

Refresh—Refresh the device user information.

{

Modify—Access the page for modifying the device user.

{

Cancel Account—Cancel the device user account.

{

Add to Blacklist—Add the device user to the blacklist. This link appears only when the device
user is not blacklisted.

{

Remove from Blacklist—Remove the device user from the blacklist. This link appears only when
the device user is blacklisted.

{

Authentication Log—View the authentication log list of the device user. For more information
about authentication logs, see "

Managing authentication logs

."

{

Authorization Log—View the authorization log list of the device user. For more information
about authorization logs, see "

Managing authorization logs

."

{

Audit Log—View the audit log list of the device user. For more information about audit logs, see
"

Managing audit logs

."

Advertising