New admin accounts can be created by superusers and by user account administrators.
To create a new admin account:
Click Settings → Admin accounts on the menu.
On the Administrator account information page, click the Add button and the following page opens.
Figure 4.3. Settings for a new administrator account
On the New account page, enter a Username and Password (twice) for the admin account, and link the account to a real person with the Real name and E-mail address.
In the Authentication Set field, define how the admin is expected to authenticate when connecting to the Management Server. For more information on the authentication sets, refer to Configuring Extended Admin Authentication.
In the Timezone field, you can define the timezone for sessions of this particular administrator. The time setting affects only the tiem shown in the session, but Tectia Manager saves all data using the UTC time.
In the Groups field, assign the admin to selected Admin Groups by moving the relevant groups to the box on the right.
Click OK to save the new admin account.
Test the account to see that all required menus are visible and actions permitted. The menus of the web-based administration interface will change depending on the access rights defined for the administrator.
Copyright 2014 SSH Communications Security Corporation This software is protected by international copyright laws. All rights reserved. Contact Information
Highlights from the SSH.COM blog:
Cryptomining with the SSH protocol: what big enterprises need to know about it
Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency. Read more
SLAM the door shut on traditional privileged access management
Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity? Read more
We broke the IT security perimeter
Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so. Read more