2-56 Setup and Operation
Login IDs and Passwords
The system allows two user logins. Each one has a unique login ID, security privileges, and
security feature settings. A system can be set up with one login who has full access or with
two logins, where one has full access and one has limited access and Setup restrictions.
At power on, the user is asked to identify himself by selecting between two login Ids and
then entering the corresponding password. If the system is set up for one login ID, the user
enters a password only and is assumed to be the supervisor.
To switch between login IDs, press the down arrow key at the login prompt. If logged in as
a user, edit the user login and password under the Security menu in Setup. If logged in as
the supervisor, many security features can be edited in Setup. Along with login ID and
password, there are minimum password length, numbers required in password, password
lifetime, and minimum password change.
The user is allowed five tries to enter the correct password. After five tries, the system
locks and displays the message: System locked - Call System Administrator. Power the
system off and back on again to reenter the password.
It is recommended that you change the password often to reduce the chance of it being
compromised. The password is configurable for a term of 1 to 511 days or may be valid
indefinitely.
Passwords can be added or deleted at boot time or while using Setup. Follow the password
entry with a “/” to change the password. The password can be a maximum of 14 characters,
can contain numbers but cannot be blank, and cannot be the same as the previous
password. Once the login ID and password are entered, the welcome banner appears on the
screen.
Multiple Logins
Since the system supports two logins, each can have its own password, system privileges,
and security configuration parameters. One of the two IDs always has full access to Setup.
This person is able to configure all passwords, login IDs, and configuration parameters,
and can restrict the other user. This person would be considered the primary user or
supervisor.
Secondary user restrictions include access to only part of Setup and limited read/write to
the diskette drive. This user has control over his general feature settings, like virus check,
various banners, network boot, hot keys and timed lock.
Network Boot
This occurs when nothing is entered at the login ID prompt and the default login ID is
used. The system loads the password and continues booting. The operating system loads
but the keyboard and mouse are locked. This operation allows unattended booting of a
network server while preventing local access to the keyboard and mouse. The password
must be entered to use the keyboard.