Chapter 3: Building Your Storage Space
●
28
Starting and Logging In on the Local System
This section describes how to start and log in to the full Adaptec Storage Manager application.
It also explains how Adaptec Storage Manager uses existing operating system permission levels
to grant different amounts of access to your storage space.
Understanding Permission Levels
When you log in to Adaptec Storage Manager, your permission level is identical to your
operating system permission level. For example, if you have Administrator permissions on
your operating system, you also have Administrator permissions in Adaptec Storage Manager.
This section describes the three different permission levels.
Administrator Level
Logging in as an Administrator allows you full access to manage and modify the controllers,
disk drives, and logical drives that are part of your storage space.
To log in as an Administrator:
●
Windows
—Enter a valid user name and password for the Administrator or Administrative
User on the system. (The Administrative User is any member of the local Administrators
group, which can, in a Domain configuration, include Domain Administrators.)
●
Linux
—Enter
root
for the user name and enter the root password.
●
UnixWare or OpenServer
—Enter
root
for the user name and enter the root password.
●
Solaris
—Enter
root
for the user name and enter the root password.
User Level
Logging in as a User partially restricts your access to the storage space, as described in this table.
To log in as a User, use your normal network user name and password.
Guest Level
Logging in as a Guest restricts your access to the storage space to “view-only”.
You can see all local and remote systems and view their properties windows, view event logs,
save configuration files and support archives, and browse the online Help.
You cannot make any changes to the storage space.
To log in as Guest, click
Cancel
on the Login window.
Users can...
User’s can’t...
Rescan controllers
Create logical drives
Save activity logs
Modify logical drives
Verify disk drives (with and without fix)
Delete logical drives
Verify logical drives (with and without fix)
Delete hot spares
Identify disk drives and enclosures
Perform data migrations
Rebuild disk drives
Create hot spares
Access the same information as Guests (see the following section)