Managing users


As an administrator, you can manage the users and their access to the BMC AMI Products for Web.

Users are added to list, depending on your scenario:

  • When you upgrade from an earlier release, existing users are automatically migrated to CES.
    • When the Require administrative password checkbox is selected in CES for earlier CES or iStrobe installations, the current release is the internal authentication mode. The system creates a version 18.2.1 CES user called CESAdmin or iStrobeAdmin with the password that was defined in the earlier release.
    • When the Require user login option is selected in the earlier iStrobe installation, the current release is placed in the internal authentication mode. You must define a password for the user ID when you upgrade to version 12.1.
  • When you enable the LDAP, Kerberos, or Client Certificates authentication mode on the Security tab, authenticated users are automatically added to the list and created in CES. They inherit the permissions of any groups that have Automatically assign users enabled during group creation. For more information, see Adding-a-security-group.
  • When you enable the Internal authentication mode on the Security tab and select Allow new users to self-register, users can register themselves and are added to the list.
  • When you manually add users to the list; for more information, see Adding a user.

On the Users tab, you can view a list of configured users with details for each such as their name, the email address associated with that user, the groups to which the user is assigned, and the individual roles assigned to that user.

Important

The functions on the Users tab are not available if you have enabled the LDAP authentication mode with the Use LDAP Groups option enabled, in the Security settings page. 

You can also perform the following actions:

Purpose

Action

Add a user.

Click Add and assign roles to them. For more information, see Adding a user.

Edit a user.

Click Edit.pngin the relevant row.

Important

When you edit a user (other than yourself) and change their password, that user must change their password at their next login. Changes to any roles assigned to the user do not take effect until their next login.

Delete a user.

Click Delete.pngin the relevant row.

Delete multiple users.

Select the checkboxes in the relevant rows and click Delete.

Sort the order in a column.

Click SortArrow.png(Sort arrow) in the column header.

Sort the order in multiple columns.

Perform the following steps:

  1. Click SortArrow.png(Sort arrow) in the column header in a column.
  2. To select more columns, perform one of the following options:
    • Press the ctrl (or command) key and click the sort arrow in the required column headers.
    • Click 3-dots.pngin the required column headers.
  3. For each selected column, go to the 3-dots.pngmenu, select Ascending or Descending, and select the desired Sort order.
    When you select a sort order, the column header displays a number to indicate the priority of the column in the sort sequence. The direction of the sort arrow indicates if the column is sorted in the ascending or descending order.

Thus, the table displays values sorted column-wise, one after the other, such that the previous sort order is not distorted by the next sort order.

From the 3-dots.pngoptions, you can also perform the following actions:

  • Change or swap the Sort order as required.
  • Remove a column from the multi-sort sequence by selecting Remove from current sort.
  • Remove all sorting by selecting Clear all sorting.

Search within the list.

In the Search field, specify your search criteria.

Filter the list of users at the column level.

In the Filter field, specify your filter criteria.

Example

To filter the list only for users who have the iStrobe User role, enter iStrobe User.

To further filter the list only for users who also have the Code Pipeline User role, enter iStrobe User Code Pipeline User.

Configure a recovery user with rights to restore the system (for example, when troubleshooting serious issues such as issues with the database or invalid LDAP credentials).

For information about troubleshooting scenarios, see Troubleshooting.

Click Recovery user. In the Add recovery user dialog box, enter the required Recovery user name, Recovery user password, reconfirm the password, and click Save.


 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*