O'Reilly logo

HP Network Node Manager 9: Getting Started by Marius Vilemaitis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Controlling Access to NNMi

The NNMi version was introduced with improved access control to NNMi. It allows users to be created and authenticated. Users can be assigned to user roles, which define what permissions will be given to a user. There was also the introduction of the ability to integrate user authentication into Directory Services using LDAP.

The following features were one more major step towards improving NNMi. This chapter describes how to control access to NNMi and which authentication model to choose.

The following topics will be covered in this chapter:

  • Creating users in NNMi
  • NNMi user roles
  • NNMi authentication types
  • Command line access configuration tools
  • User activity audit

How access to NNMi works

Access to the NNMi console ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required