User profile panel
Select the User profiles option from the Administration/Utilities Menu to display the Profile Selection List panel. Adding or editing a profile displays the User Profile panel, which lists all of the authorizations and security that is associated with the user profile.
User Profile panel
Command ===> ________________________________________________ Scroll ===> PAGE
Profile name . . . . . . . . : JOHN
Description . . . . . . . . : JOHN'S PROFILE
Authorizations
User security profile . . . : ________
Courtesy security checks . : _
Select the entry with one of the following. Then press Enter.
L=List
Act Name Security No. of definitions
.. OPRX BIGDAWG 1
******************************* Bottom of data ********************************
The following fields are displayed on the User Profile panel:
Field | Description |
---|---|
Profile | The name of the user profile that is being edited. |
Description | The description of the profile that is being edited. |
User security profile | The name of the user security profile to use with this profile. This value is overridden by any security profiles specified for specific OPERTUNEs and subsystems in the user’s access list. If no value is specified, the DEFAULT security profile is used (see Rules for determining authorizations for more details). |
Courtesy security | Whether security is checked at the host before a command is built and sent to the target or if it is checked at the target. Specify one of the following values:
If security is set differently for the user on the host than it is on the target, the result will vary. For example, security on the host specifies that the user can only view information and security on the target specifies that the user can execute all commands. If the Courtesy security checks field is set to Y, the user cannot execute any commands on the target because the host security settings indicate that the user can only view information. If the Courtesy security checks field is set to N, the user can execute commands on the target. |
Name | The names of the OPERTUNEs that the user is authorized to access are listed. |
Security | The security profile associated with the corresponding OPERTUNE. If a security profile is specified, additional restrictions might apply (see Rules for determining authorizations for more information) |
No. of definitions | The number of subsystem definitions that are associated with the system profile. |
Related topic