5-55
User
Guide

for

the

Cisco

Application

Networking

Manager

5.2
OL-26572-01
Chapter
5






Importing

and

Managing

Devices
Configuring
ACE

Module

and

Appliance

Role-Based

Access

Controls
Step
3
Configure
the

user

attributes
using
the
information

in
Ta
b

l

e
5-19
.
Step
4
Click
Deploy
Now

to

deploy
this

configuration

on

t

he
ACE
and

save

your

entries

t

o

the
running-configuration
and

startup-configuration

files.
The
Users

table

appears.
Related
Topics


Configuring
Device

RBAC

Users,

page
5-53


Configuring
ACE

Module

and

Appliance

Role-Based

Access

Controls,

page
5-53
Modifying
Device

User

Accounts
You
can

modify

an

existing

user

account

in

a

selected

ACE

context.
Note
This
configuration
is
applicable

only

on
the
device
or

building

block

and

will

not

be
enforced
by

ANM.
To
manipulate

ANM

RBAC,

go

t

o

Admin

>

Rol

e-Based

Access

Control.
Procedure
Step
1
Choose
the

item

to

configure:


To
configure

a

virtual

context,

choose
Config
>

Devices

>

context

>

Device

RBAC

>

Users.


To
configure
a

configuration

building

bl

ock,

choose
Config
>
Global
>
Building

Blocks
>
building_block
>

Role-Based

Access

Control

>

Users.
A
table

of

users,

expiration

dates,

roles,

and

domains

appears.
Step
2
Choose
the

user

account

that

you

want

to
modify.
Step
3
Click
Edit.
Step
4
Modify
any
of

the

attributes

in
the
table

(see
Ta
b

l

e
5-19
).
Ta
b

l

e


5-19
User
Attributes
Field
Description
User
Name
Name
by

which

the

user

is

to

be

identified

(up

to

24

characters).

Only

letters,

numbers,

and

an
underscore
can

be

used.

The

field

is

case

sensitive.
Expiry
Date
Date
that

user

account

expires

(optional).
Password
Entered

As
Password
for

this

user

account.

You

can

choose

Clear

Text

or

Encrypted

Text.
Password
Password
for

the

user

account.
Confirm
Password
Password
for


this

account

that

you

reenter.
Encryption
Password
in

either

clear

or

encrypted

text.
Role
Role
that

you

customize

or

accept

as

an

existing

role.

To

enter

the

Role

for

this

user,

see

the
“Configuring
Device

User

Roles”

section

on

page

5-58 .

See

Ta

b

l

e


5-20

for

details

about

setting

up
new
roles.
Domains
Domains
to

which

this

user

belongs.

Use

t

he

Add

and

Remove

bu

t

t

on

s

.