User administration permission, Viewing the local users section, Local users section components – HP Secure Key Manager User Manual

Page 140

Advertising
background image

Figure 64 Viewing the Local Users section

The following table describes the components of the Local Users section.

Table 45 Local Users section components

Description

Component

This is the name of the user. The username must begin with a letter, it must be between
1 and 64 characters (inclusive), and it can consist of letters, numbers, underscores
(_), periods (.), and hyphens (-).

Username

The password for the local user. The requirements for the local user password depend
on your Password Management Settings. For information on password requirements,
refer to

Password Constraints

. The maximum password length is 64 characters. The

passwords displayed on the Local Users section are masked with eight asterisks (*).
When changing the password, you should clear this field before entering the new
password. If you do not clear this field, the asterisks become a part of the new pass-
word.

Password

When selected, this user can create, modify, and delete users and groups via the
XML interface. This permission also allows a user to modify his or her own user per-
missions. Users with the User Administration Permission value selected automatically
have the Change Password Permission.

User Administration
Permission

When selected, this user can change his or her own password via the XML interface.
Users with User Administration Permission selected automatically have the Change
Password Permission.

Change Password
Permission

Click Edit to change the password or the permissions for a user.

Edit

Click Add to add a user.

Add

Click Delete to delete a user.

Delete

Click Properties to access the Selected Local User page.

Properties

User Administration Permission

You should be extremely cautious in assigning the User Administration Permission. Its use should be
reserved for situations where you want to perform user administration programmatically using the
XML interface of the KMS Server (as opposed to the Management Console). In such deployments, the
User Administration Permission should be given to a very small number of users. Most users should
not be given this permission.

Using the Management Console

140

Advertising