Uscire dalla vista stampa
Per proteggere l'accesso utente in Oracle ILOM, consultare i seguenti argomenti:
Avoid the Creation of Shared User Accounts
Assignment of Role-Based Privileges
Security Guidelines for Managing User Accounts and Passwords
Remote Authentication Services and Security Profiles
Configuring User Access for Maximum Security