Chapter 21: Access Management and Security (CLI)
Configuring Users (CLI)
phn-3963_004v000
Page 21-404
Configuring Users (CLI)
This section includes:
User Configuration Overview (CLI)
Configuring User Profiles (CLI)
Configuring User Accounts (CLI)
Related topics:
User Configuration Overview (CLI)
User configuration is based on the Role-Based Access Control (RBAC) model. According to the
RBAC model, permissions to perform certain operations are assigned to specific roles. Users are
assigned to particular roles, and through those role assignments acquire the permissions to
perform particular system functions.
In the PTP 820 GUI, these roles are called user profiles. Up to 50 user profiles can be configured.
Each profile contains a set of privilege levels per functionality group, and defines the management
protocols (access channels) that can be used to access the system by users to whom the user
profile is assigned.
The system parameters are divided into the following functional groups:
Security
Management
Radio
TDM
Ethernet
Synchronization
A user profile defines the permitted access level per functionality group. For each functionality
group, the access level is defined separately for read and write operations. The following access
levels can be assigned:
None – No access to this functional group.
Normal – The user has access to parameters that require basic knowledge about the functional
group.
Advanced – The user has access to parameters that require advanced knowledge about the
functional group, as well as parameters that have a significant impact on the system as a
whole, such as restoring the configuration to factory default settings.