Permission for accessing local client files, Permission for accessing local client files -22, Files – Hitachi MK-96RD621-08 User Manual

Page 50

Advertising
background image

2-22

Installation Requirements and Procedures

Hitachi Universal Storage Platform V/VM Hitachi Storage Navigator User’s Guide

Table 2-6

Specifications and Restrictions Concerning Login Operations

Item

Specification

Maximum number of
concurrent users

The USP V/VM can support up to 32 concurrent users.
The exceptions are displaying the Performance Monitor window
and executing the Export Tool, where the limit is two concurrent
users.

Logging in to multiple SVPs
(Web servers)

The same user can concurrently log in to more than one SVP, by
opening a storage device list, downloading the Java application
program from each SVP, and executing the Java application on
separate Web browser windows.
If you execute multiple Java application programs for multiple
SVPs, insufficient memory may degrade performance.

Logging in to the same SVPs
(Web servers) more than once
concurrently

The same user (ID) may not have multiple concurrent sessions
with the same SVPs (Web servers).

Security measure

If you have failed to log in three times with the same user ID,
Storage Navigator stops replying for one minute. However, it is
not a system failure.

Login history

All login information, including user ID, login and logoff time, is
recorded in the audit log file, so that unauthorized access can be
detected.

Automatic logout operation

In case a user cannot normally log out, you can set the user to
be automatically logged out from the SVP after a specific period
of time. This period of time can be specified by the storage
administrator with the Storage Administrator Role set to
Enable.

Permission for Accessing Local Client Files

Java applications have a security feature that prohibits the Java applications
from accessing local files on client computers. To use Storage Navigator, you

must give Storage Navigator permission to access local files on your computer.

The following figure shows the concept of the Java application security.

Advertising