Assigning security roles for users and user groups
Assign security roles for users and user groups either at the system level or the resource level.
Before you begin
About this task
System level security roles provide access control to major functional areas for managing the overall system, whereas resource level security sub-roles and permissions provide access control to individual resources, for example cloud groups, IP groups, and compute nodes.
To reflect the permission changes, log out and log back in from the console.
When assigning permissions for individual resources in resource level administration, you can select the level of access (read, write, all, none) for those specific resources. For example, a user can be granted read access to some cloud group and hardware resources, and write access to other resources.
You can use the console or the command line interface to complete this task. For the command line information, see the Related information section.
Procedure
What to do next
- Click Delete in the toolbar.
- Click Delete in the dialog that is displayed.
- Select the Delete users from all systems in the domain check box, and then click Delete.