Security Management
FOXMAN-UN’s security management ensures only authorized FOXMAN-UN users can access the system. It includes proper configuration of management rights, privileges and permission of authorized FOXMAN-UN users based on users and roles definition. It ensures that the network administrators can control what each of these users and roles are allowed to.
FOXMAN-UN security elements consists of connection management, domains, users, roles, and profiles.
The FOXMAN-UN connection manager requires username and password to authenticate a FOXMAN-UN user. A domain containing a number of elements (NEs, security profiles, agents, services, etc.) is assigned to a FOXMAN-UN user via a role (predefined system role or user-defined role) which determines the FOXMAN-UN functions the user has a right to execute. For example, a FOXMAN-UN user with a specific role can manage specific nodes without knowing the nodes’ passwords. It’s the user’s role(s) that defines whether or not the user can access the configuration of specific nodes.
Please note: