This command displays and configures user accounts, also called user profiles, of the primary CMM.
If command syntax is not correctly entered, or if a command fails to run, an error message is returned. See Common errors for a list of error messages that apply to all commands or users command errors for a list of error messages that are specific to the users command.
Function | What it does | Command | Target (see paths in Command targets) |
---|---|---|---|
Display all user profiles | Displays all 84 (maximum) CMM user
profiles. Returned user values are:
A list of current user permission groups displays after the list of user profiles. |
users | Primary CMM:
|
Display active users | Displays all users that are currently logged in
to the CMM.
Returned values include:
|
users -curr | Primary CMM:
|
Terminate user session | Terminates the specified user login session. Note: The
session ID is found by running the users -curr command.
|
users
-ts sessionID where sessionID is a number that corresponds to the user session ID. This command can only
be run by users who have one or more of the following command authorities:
|
Primary CMM:
|
Display single user profile | Displays the specified CMM user
profile. Returned values are:
Note: User names are not case sensitive.
|
users
-n user_name where user_name is a user name assigned in the "Display all user profiles" list. |
Primary CMM:
|
Disable user profile | Disables the specified CMM user
profile. Note: User names are not case sensitive.
|
users
-disable -n user_name where user_name is a user name assigned in the "Display all user profiles" list. This
command can only be run by users who have one or more of the following
command authorities:
|
Primary CMM:
|
Enable user profile | Enables a specified CMM user
profile that is disabled. Note: User names are not case
sensitive.
|
users
-enable -n user_name where user_name is a user name assigned in the "Display all user profiles" list. This
command can only be run by users who have one or more of the following
command authorities:
|
Primary CMM:
|
Unlock user profile | Unlocks a specified CMM user
profile that is locked. Note: User names are not case sensitive.
|
users
-unlock -n user_name where user_name is a user name assigned in the "Display all user profiles" list. This
command can only be run by users who have one or more of the following
command authorities:
|
Primary CMM:
|
Delete user profile | Delete the specified CMM user
profile. Note: User names are not case sensitive.
|
users -clear -n user_name where user_name is a user name assigned in the "Display all user profiles" list. This
command can only be run by users who have one or more of the following
command authorities:
|
Primary CMM:
|
Add user | Create the specified CMM user.
The following user-profile fields are required:
Note:
|
users -add -n user_name -p user_password -g permission_group -ms max_sessions where:
(continued on next page) This command can only
be run by users who have one or more of the following command authorities:
|
Primary CMM:
|
Change user password (own password) | Allows a user to change the user password in their
own CMM user
profile. Note:
|
users
-n user_name -op old_password -p new_password where:
Users who do not have authority to manage accounts can change their own password using the -op option. |
Primary CMM:
|
Change user password (other user) | Forces a password change in the specified CMM user
profile. Note:
|
users
-n user_name -p new_password where:
This command can only be run by users who have one or more
of the following command authorities:
|
Primary CMM:
|
Set user permission groups |
Sets the user permission groups in the specified CMM user
profile. Note: User names and group names are not case sensitive.
|
users
-n user_name -g permission_group where:
This command can only be run by users who have one or more
of the following command authorities:
|
Primary CMM:
|
Set maximum number of simultaneous sessions for user | Sets the maximum number of simultaneous login sessions
for the specified user. Note: User names are not case sensitive.
|
users
-n user_name-ms max-session where:
This command can only be run by users who have one or more
of the following command authorities:
|
Primary CMM:
|
Add SSH public key to user | Adds an SSH public key to the specified user. The following user-profile fields are required:
|
users
-add -n user_name -kf key_format -key
" key" where:
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
Remove SSH public key from user | Removes one or all SSH public keys associated with the specified user. | users
-remove -n user_name -ki key_index where:
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
Import (upload) and add new SSH public key | Import (upload) and add a new SSH public key for
user. The upload location of the key file, including IP address and filename, an must be set using the -u command option. |
users
-upld -n user_name -kf key_format -u URL where:
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
Import (upload) and update existing SSH public key | Import (upload) and update existing SSH public
key for user. The upload location of the key file, including IP address and filename, an must be set using the -u command option. |
users
-upld -n user_name -ki key_index -kf key_format -u URL where:
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
Export (download) SSH public key | Export (download) the specified SSH public key. The download location of the key file, including IP address and filename, and must be set using the -u command option. |
users
-dnld -n user_name -ki key_index -kf key_format -u URL where:
|
Primary CMM:
|
Display SSH public key information (summary) | Displays SSH public key information summary for the specified user. | users -u user_name -ki key_index where:
|
Primary CMM:
|
Display complete SSH public key information | Displays complete SSH public key information for
the specified user. Note: When displaying complete key information,
you can only specify one key index each time you run the command.
|
users -u user_name -ki key_index -kf key_format -e where:
|
Primary CMM:
|
Update SSH public key | Updates the information for the specified SSH public
key for the specified user. Information that can be updated includes:
|
users
-n user_name -ki key_index -kf key_format -key
" key" -af " host_list"
-cm " comment" where:
(continued on next page) |
Primary CMM:
|
Update SSH public key (continued) |
This command can only be run by users who have
one or more of the following command authorities:
|
||
Update user SNMPv3 information | Updates the SNMPv3 information for the specified
user. Information that can be updated includes:
Note: SNMPv3 related command options can also be modified singly
for each specified user.
|
users
-n user_name -cn "context_name"
-ap authentication_protocol -pp privacy_proto -ppw privacy_pwd -at access_type -i hostname/ip_address where:
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
Enable / disable compute node and I/O module account management by CMM | Enables management by CMM of
the IPMI and SNMPv3 user accounts for compute nodes and of the SNMPv3
user accounts for I/O Modules. This command option allows the CMM user accounts to be used for managing most compute nodes and I/O modules in the chassis instead of having management device user accounts manage the compute nodes and the I/O modules. Important: Management of compute node IPMI and SNMPv3 user accounts
is not supported by POWER-based compute nodes and by I/O modules with
firmware versions lower than 8.4.3.
Note:
|
users
-am state -prov_target target where:
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
Enable / disable SNMPv3 and/or IPMI centralized management | Enables or disables centralized
management of SNMPv3 and/or IPMI user accounts, including user provisioning. This command enables you to control whether or not specific CMM user accounts can be used to manage chassis components (including provisioning). There can be up to 12 provisioned user accounts for nodes and up to 12 provisioned user accounts for I/O modules. Remember that enabling a user account will not actually allow local management of chassis components unless you have enabled compute node and/or I/O module account management by CMM using the users -am enabled command option. Note: Disabling centralized IPMI and SNMPv3
management (provisioning) of a user account deletes the centrally
managed user account. If there is a corresponding local account for
this user on the CMM, it will remain functional.
|
users
-ipmisnmpv3 state -n user_name -prov_target target where:
This command can only be run by users who have one or more
of the following command authorities:
|
Primary CMM:
|
Change new user creation method | Changes new user creation method. There are two available:
See User authority management for more information. Note: An email server must be configured
in network settings before“username&email” method can be selected
(see SMTP in CMM management options).
|
users
-nucm state where state is username&password or username&email: |
Primary CMM:
|
users -add -n user3 -p passw0rd -g super -ms 10
users
users -n test
users -n test -add -kf openssh -key "ssh-rsa AAAAB3NzaC1yc2EAAAA BIwAAAQEAvfnTUzRF7pdBuaBy4dO/aIFasa/Gtc+o/wlZnuC4aDHMA1UmnMyLOCiIaNOy4OOICEKCq jKEhrYymtAoVtfKApvY39GpnSGRC/qcLGWLM4cmirKL5kxHNOqIcwbT1NPceoKHj46X7E+mqlfWnAh hjDpcVFjagM3Ek2y7w/tBGrwGgN7DPHJU1tzcJy68mEAnIrzjUoR98Q3/B9cJD77ydGKe8rPdI2hIE pXR5dNUiupA1Yd8PSSMgdukASKEd3eRRZTBl3SAtMucUsTkYjlXcqex1OQz4+N50R6MbNcwlsx+mTE AvvcpJhuga70UNPGhLJMl6k7jeJiQ8Xd2pXbOZQ=="
users -n test -ki 1
users -n test -ki all
users -n test -ki 1 -kf openssh -e
users -n test -dnld -ki 1 -kf openssh -u tftp://9.72.216.40/file.key
users -n test -upld -ki 1 -kf openssh -u tftp://9.72.216.40/file.key
users -n test -ki 1 -remove
users -n test -ki all -remove
The following example shows the information that is returned from these commands:
system:mm[2]> users -add -n user3 -p passw0rd -g super -ms 10 OK system:mm[2]> users Node provisioning: disabled I/O module provisioning: disabled Users ===== USERID Group(s): supervisor 1 active session(s) Max 0 session(s) allowed Account is active Password is not expired Password is compliant There is no SSH public key installed for this user IPMI and SNMPv3 user provisioning for nodes is disabled SNMPv3 user provisioning for I/O modules is disabled user3 Group(s): super 0 active session(s) Max 10 session(s) allowed Account is active Password is not expired Password is compliant There is no SSH public key installed for this user IPMI and SNMPv3 user provisioning for nodes is disabled SNMPv3 user provisioning for I/O modules is disabled test Group(s): opmin 0 active session(s) Max 2 session(s) allowed Account is active Password is not expired Password is compliant Number of SSH public keys installed for this user: 2 IPMI and SNMPv3 user provisioning for nodes is disabled SNMPv3 user provisioning for I/O modules is disabled User Permission Groups ====================== supervisor Role:supervisor Blades:1|2|3|4|5|6|7|8|9|10|11|12|13|14 Chassis:1 Modules:1|2|3|4|5|6|7|8|9|10 operator Role:operator Blades:1|2|3|4|5|6|7|8|9|10|11|12|13|14 Chassis:1 Modules:1|2|3|4|5|6|7|8|9|10 opmin Role:operator Blades:n/a Chassis:n/a Modules:n/a system:mm[2]> users -n test -g opmin -ms 5 -cn admin -ap sha -pp des -at set -i 0.0.0.0 Node provisioning: -ipmisnmpv3 disabled I/O module provisioning: -snmpv3 disabled 0 active session(s) Max 2 session(s) allowed Account is active Password is not expired Password is compliant Number of SSH public keys installed for this user: 2 Last login: Never system:mm[2]> users -n test -add -kf openssh -key "ssh-rsa AAAAB3NzaC1yc2EAAAA BIwAAAQEAvfnTUzRF7pdBuaBy4dO/aIFasa/Gtc+o/wlZnuC4aDHMA1UmnMyLOCiIaNOy4OOICEKCq jKEhrYymtAoVtfKApvY39GpnSGRC/qcLGWLM4cmirKL5kxHNOqIcwbT1NPceoKHj46X7E+mqlfWnAh hjDpcVFjagM3Ek2y7w/tBGrwGgN7DPHJU1tzcJy68mEAnIrzjUoR98Q3/B9cJD77ydGKe8rPdI2hIE pXR5dNUiupA1Yd8PSSMgdukASKEd3eRRZTBl3SAtMucUsTkYjlXcqex1OQz4+N50R6MbNcwlsx+mTE AvvcpJhuga70UNPGhLJMl6k7jeJiQ8Xd2pXbOZQ==" OK system:mm[2]> users -n test -g opmin -ms 5 -cn admin -ap sha -pp des -at set -i 0.0.0.0 Node provisioning: -ipmisnmpv3 disabled I/O module provisioning: -snmpv3 disabled 0 active session(s) Max 2 session(s) allowed Account is active Password is not expired Password is compliant Number of SSH public keys installed for this user: 3 Last login: Never system:mm[2]> users -n test -ki 1 ssh-rsa 2048 bits 69:d0:2d:4e:72:09:88:0d:ff:63:87:2c:26:5d:f6:f2 -af -cm system:mm[2]> users -n test -ki all Key 1 ssh-rsa 2048 bits 69:d0:2d:4e:72:09:88:0d:ff:63:87:2c:26:5d:f6:f2 -af -cm Key 2 ssh-rsa 2048 bits 69:d0:2d:4e:72:09:88:0d:ff:63:87:2c:26:5d:f6:f2 -af -cm Key 3 ssh-rsa 2048 bits 69:d0:2d:4e:72:09:88:0d:ff:63:87:2c:26:5d:f6:f2 -af -cm system:mm[2]> users -n test -ki 1 -kf openssh -e ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvfnTUzRF7pdBuaBy4dO/aIFasa/Gtc+o/wlZnuC4aD HMA1UmnMyLOCiIaNOy4OOICEKCqjKEhrYymtAoVtfKApvY39GpnSGRC/qcLGWLM4cmirKL5kxHNOqI cwbT1NPceoKHj46X7E+mqlfWnAhhjDpcVFjagM3Ek2y7w/tBGrwGgN7DPHJU1tzcJy68mEAnIrzjUo R98Q3/B9cJD77ydGKe8rPdI2hIEpXR5dNUiupA1Yd8PSSMgdukASKEd3eRRZTBl3SAtMucUsTkYjlX cqex1OQz4+N50R6MbNcwlsx+mTEAvvcpJhuga70UNPGhLJMl6k7jeJiQ8Xd2pXbOZQ== system:mm[2]> users -n test -dnld -ki 1 -kf openssh -u tftp://9.72.216.40/file.key OK system:mm[2]> users -n test -upld -ki 1 -kf openssh -u tftp://9.72.216.40/file.key OK system:mm[2]> users -n test -ki 1 -remove OK system:mm[2]> users -n test -ki all -remove OK