Managing users


As an administrator, you can manage the users and their access to the BMC AMI Products for Web.

Users are added to list, depending on your scenario:

  • When you upgrade from an earlier release, existing users are automatically migrated to CES.
    • When the Require administrative password checkbox is selected in CES for earlier CES or iStrobe installations, the current release is the internal authentication mode. The system creates a version 18.2.1 CES user called CESAdmin or iStrobeAdmin with the password that was defined in the earlier release.
    • When the Require user login option is selected in the earlier iStrobe installation, the current release is placed in the internal authentication mode. You must define a password for the user ID when you upgrade to version 12.1.
  • When you enable the LDAP, Kerberos, or Client Certificates authentication mode on the Security tab, authenticated users are automatically added to the list and created in CES. They inherit the permissions of any groups that have Automatically assign users enabled during group creation. For more information, see Adding-a-security-group.
  • When you enable the Internal authentication mode on the Security tab and select Allow new users to self-register, users can register themselves and are added to the list.
  • When you manually add users to the list; for more information, see Adding-a-user.

On the Users tab, you can view a list of configured users with details for each such as their name, the email address associated with that user, the groups to which the user is assigned, and the individual roles assigned to that user.

Important

The functions on the Users tab are not available if you have enabled the LDAP authentication mode with the Use LDAP Groups option enabled, in the Security settings page. 

You can also perform the following actions:

Purpose

Action

Add a user.

Click Add and assign roles to them. For more information, see Adding-a-user.

Edit a user.

Click Edit.pngin the relevant row.

Important

When you edit a user (other than yourself) and change their password, that user must change their password at their next login. Changes to any roles assigned to the user do not take effect until their next login.

Delete a user.

Click Delete.pngin the relevant row.

Delete multiple users.

Select the checkboxes in the relevant rows and click Delete.

Sort the order in the table.

Click the column header.

Search within the list.

In the Search field, specify your search criteria.

Filter the list of users at the column level.

In the Filter field, specify your filter criteria.

Example

To filter the list only for users who have the iStrobe User role, enter iStrobe User.

To further filter the list only for users who also have the Code Pipeline User role, enter iStrobe User Code Pipeline User.

Configure a recovery user with rights to restore the system (for example, when troubleshooting serious issues such as issues with the database or invalid LDAP credentials).

For information about troubleshooting scenarios, see Troubleshooting.

Click Recovery user. In the Add recovery user dialog box, enter the required Recovery user name, Recovery user password, reconfirm the password, and click Save.



 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*