A user role specifies the type of management tasks that an Enterprise Manager user can perform on managed devices in your network. Permissions for user roles are classified as either non-restricted or restricted. The user roles are defined as:
Users are authenticated through Enterprise Manager's local database.
There are eight different types of permissions that you can specify for each restricted user role. You can specify any of these management task permissions to the Operator and Application Editor user roles.
|Manage Device Configuration Archives||Create and manage UCS archives for all managed devices|
|Browse Device Configurations||View configurations from the Enterprise Manager configuration browser|
|Compare Device Configuration Archives||Compare UCS configuration files between two devices|
|Stage Changesets for Deployment from Published Templates||Create a new staged changeset from a published template|
|Deploy Staged Changesets||Deploy a staged changeset created by a user|
|Administer Device Lists||Manage device list members|
|Synchronize Device Configuration with Peer||Synchronize peer device configurations|
|Failover Devices||Initiate a failover to a peer managed device|
All users and their privileges are displayed on the User list screen.
|Administrator||Grants user complete access to all objects on the system and permission to perform configuration synchronization for a BIG-IP device service clustering configuration.|
|Operator||Grants user permission to enable or disable existing nodes and pool members.|
|Application Editor||Grants user permission to modify existing nodes, pools, pool members, and monitors.|
Managed BIG-IP systems contain accounts that specify the authorization (level of access) for users. When you configure user account information on a BIG-IP system, you set parameters such as user names and passwords, shell access information, web interface and root access privileges, and an authentication source. You can use Enterprise Manager to view and copy account parameters from managed devices to other managed devices, as well as to modify passwords.
The screen displays the devices associated with the selected user.
|Add users not already present on device||Adds user accounts to the destination device instead of replacing the users with those on the source device.|
|Replace users on device||Deletes all user accounts on the destination device and replaces them with the user accounts from the source device.|