Hitachi Energy
Creation of FOXMAN‑UN User Accounts
Introduction
The first step is to create a Linux account for each user account to be used. The installation will automatically create the “nemadm” Linux account with its home directory /opt/nem/nemadm. The “nemadm” user can, however, not be used to log in to FOXMAN‑UN. It is only used as owner of the installation file system and owner of FOXMAN‑UN system processes.
It is recommended that you create a separate user account for each FOXMAN‑UN user, including the NEM Security Administrator. The main advantage of this is that you can make full use of the security mechanisms provided by the FOXMAN‑UN software using role-based access control (RBAC). For example, different users may be given access to a different set of features and function areas.
In addition, some users may be given administrator privileges so that they can also perform FOXMAN‑UN administration tasks when, e.g., the NEM Security Administrator is not available.
* 
Please note: 
Only the “nemadm” account is created automatically at installation time. All other accounts have to be created as described below.
Before you start however, you should give some thought to the management of user passwords. When you create a new user account, you will have to configure a password for that user. If the user account is to be used by another person, then how should you set the password? One possibility is to leave the password empty, and tell the user to set their password at the earliest opportunity. Unfortunately this opens a potential security hole, as anyone can now login as that user without having to enter a password. Another possibility is to enter a default password, such as the name of your company, and tell the user to change their password as soon as they log in. Although this offers slightly increased security, do not forget that it may be some time before the user logs in, or they may forget to change their password.
For sites requiring increased security, note that Linux offers the following additional features (amongst others):
It is possible to force the user to change his password when logging in.
It is possible to force users to change their passwords periodically.