Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Example Security Group Structure
The three ovals in the following diagram indicate the primary groupings for which users need to view the nodes in this example NNMi topology. For complete user access control, each of the four unique subgroups corresponds to a unique security group. Each unique security group can be mapped to one or more user groups to represent the available levels of user access to the objects in that security group.
Example Security Group Mappings lists the mappings between the security groups and the possible custom user groups for this topology. (An actual implementation of this security model might not require all of these custom user groups.) Example User Account Mappings lists the mappings for several user accounts and the user groups for this topology.
Example Topology for User Access Requirements
Security Group |
Nodes of Security Group |
User Group |
Object Access Privilege |
---|---|---|---|
SG1 |
A, B, C |
UG1 Administrator |
Object Administrator |
UG1 Level 2 |
Object Operator Level 2 |
||
UG1 Level 1 |
Object Operator Level 1 |
||
UG1 Guest |
Object Guest |
||
SG2 |
D, E |
UG2 Administrator |
Object Administrator |
UG2 Level 2 |
Object Operator Level 2 |
||
UG2 Level 1 |
Object Operator Level 1 |
||
UG2 Guest |
Object Guest |
||
SG3 |
F, G |
UG3 Administrator |
Object Administrator |
UG3 Level 2 |
Object Operator Level 2 |
||
UG3 Level 1 |
Object Operator Level 1 |
||
UG3 Guest |
Object Guest |
||
SG4 |
H, I, J |
UG4 Administrator |
Object Administrator |
UG4 Level 2 |
Object Operator Level 2 |
||
UG4 Level 1 |
Object Operator Level 1 |
||
UG4 Guest |
Object Guest |
User Account |
User Groups |
Node Access |
Notes |
---|---|---|---|
User Q |
NNMi Level 2 Operators |
none |
This user has operator level 2 access to the nodes in the pink oval (solid line). |
UG1 Level 2 |
A, B, C |
||
UG2 Level 2 |
D, E |
||
UG3 Level 2 |
F, G |
||
User R |
NNMi Level 1 Operators |
none |
This user has operator level 1 access to the nodes in the orange oval (dashed line). |
UG2 Level 1 |
D, E |
||
User S |
NNMi Level 2 Operators |
none |
This user has operator level 2 access to the nodes in the green oval (dotted line). |
UG3 Level 2 |
F, G |
||
UG4 Level 2 |
H, I, J |
||
User T |
NNMi Level 2 Operators |
none |
This user has access (with varying privilege levels) to all nodes in the example topology. This user has administrative access to nodes D and E but cannot see the menu items for tools that require administrative access. If this user has access to the NNMi management server, this user can run command-line tools that require administrative access against nodes D and E only. |
UG1 Guest |
A, B, C |
||
UG2 Administrator |
D, E |
||
UG3 Level 2 |
F, G |
||
UG4 Level 1 |
H, I, J |
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to network-management-doc-feedback@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: