How Access Management works

Use Access Management to establish user authentication in SANtricity Unified Manager.

Configuration workflow

Access Management configuration works as follows:

  1. An administrator logs in to Unified Manager with a user profile that includes Security admin permissions.
    Note: For first-time login, the username admin is automatically displayed and cannot be changed. The admin user has full access to all functions in the system. The password must be set on first-time login.
  2. The administrator navigates to Access Management in the user interface, which includes pre-configured local user roles. These roles are an implementation of RBAC (role-based access control) capabilities.
  3. The administrator configures one or more of the following authentication methods:
    • Local user roles – Authentication is managed through RBAC capabilities. Local user roles include pre-defined users and roles with specific access permissions. Administrators can use these local user roles as the single method of authentication, or use them in combination with a directory service. No configuration is necessary, other than setting passwords for users.
    • Directory services – Authentication is managed through an LDAP (Lightweight Directory Access Protocol) server and directory service, such as Microsoft's Active Directory. An administrator connects to the LDAP server, and then maps the LDAP users to the local user roles.
  4. The administrator provides users with login credentials for Unified Manager.
  5. Users log in to the system by entering their credentials. During login, the system performs the following background tasks:
    • Authenticates the user name and password against the user account.
    • Determines the user's permissions based on the assigned roles.
    • Provides the user with access to functions in the user interface.
    • Displays the user name in the top banner.

Functions available in Unified Manager

Access to functions depends on a user's assigned roles, which include the following:

  • Storage admin – Full read/write access to storage objects on the arrays, but no access to the security configuration.
  • Security admin – Access to the security configuration in Access Management and Certificate Management.
  • Support admin – Access to all hardware resources on storage arrays, failure data, and MEL events. No access to storage objects or the security configuration.
  • Monitor – Read-only access to all storage objects, but no access to the security configuration.

An unavailable function is either grayed out or does not display in the user interface.