users command
This command displays and configures user accounts, also called user profiles, of the primary CMM.
- Permission groups are viewed and modified using the permgroups command.
- Users can be backed up as part of the CMM configuration using the write command.
- Users are restored as part of a backed up CMM configuration using the read command.
- When the CMM is set to
Secure
security mode, only secure file transfer methods, such as HTTPS and SFTP, can be used for tasks involving file transfer when the CMM is acting as a server. Unsecure file transfer protocols, such as HTTP, FTP, and TFTP, are disabled when the CMM is acting as a server when the security mode is set toSecure
. Unsecure file transfer protocols remain available for a CMM acting as a client for all commands when the security mode is set toSecure
. - For information about how to specify a URL for file transfer, see Specifying a URL for file transfer.
- Before you update the firmware for Power Systems compute nodes using an optional management device, make sure that the passwords for the Power Systems compute node accounts on the CMM will not expire before the update is complete. If the passwords expire during a code update, the compute nodes might not reconnect to the management software, and each Power Systems compute node might have to be updated with a new password.
- The user accounts set up in the CMM are used to log in to the service processor interfaces of the compute nodes.
If command syntax is not correctly entered, or if a command fails to run, an error message is returned. See Common errors for a list of error messages that apply to all commands or users command errors for a list of error messages that are specific to the users command.
Function | What it does | Command | Target (see paths in Command targets) |
---|---|---|---|
Display all user profiles | Displays all 84 (maximum) CMM user profiles. Returned user values are:
A list of current user permission groups displays after the list of user profiles. | users | Primary CMM:
|
Display active users | Displays all users that are currently logged in to the CMM. Returned values include:
| users -curr | Primary CMM:
|
Terminate user session | Terminates the specified user login session. Note The session ID is found by running the | users -ts sessionID where sessionID is a number that corresponds to the user session ID. This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Display single user profile | Displays the specified CMM user profile. Returned values are:
Note User names are not case sensitive. | users -n user_name where user_name is a user name assigned in the "Display all user profiles" list. | Primary CMM:
|
Disable user profile | Disables the specified CMM user profile. Note User names are not case sensitive. | users -disable -n user_name where user_name is a user name assigned in the "Display all user profiles" list. This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Enable user profile | Enables a specified CMM user profile that is disabled. Note User names are not case sensitive. | users -enable -n user_name where user_name is a user name assigned in the "Display all user profiles" list. This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Unlock user profile | Unlocks a specified CMM user profile that is locked. Note User names are not case sensitive. | users -unlock -n user_name where user_name is a user name assigned in the "Display all user profiles" list. This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Delete user profile | Delete the specified CMM user profile. Note User names are not case sensitive. | users -clear -n user_name where user_name is a user name assigned in the "Display all user profiles" list. This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Add user | Create the specified CMM user. The following user-profile fields are required:
Note
| users -add -n user_name -p user_password -g permission_group -ms max_sessions where:
(continued on next page) This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Change user password (own password) | Allows a user to change the user password in their own CMM user profile. Note
| users -n user_name -op old_password -p new_password where:
Users who do not have authority to manage accounts can change their own password using the -op option. | Primary CMM:
|
Change user password (other user) | Forces a password change in the specified CMM user profile. Note
| users -n user_name -p new_password where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Sets the user permission groups in the specified CMM user profile. Note User names and group names are not case sensitive. | users -n user_name -g permission_group where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
| |
Set maximum number of simultaneous sessions for user | Sets the maximum number of simultaneous login sessions for the specified user. Note User names are not case sensitive. | users -n user_name-ms max-session where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Add SSH public key to user | Adds an SSH public key to the specified user. The following user-profile fields are required:
| users -add -n user_name -kf key_format -key " key" where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Remove SSH public key from user | Removes one or all SSH public keys associated with the specified user. | users -remove -n user_name -ki key_index where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Import (upload) and add new SSH public key | Import (upload) and add a new SSH public key for user. The upload location of the key file, including IP address and filename, an must be set using the -u command option. | users -upld -n user_name -kf key_format -u URL where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Import (upload) and update existing SSH public key | Import (upload) and update existing SSH public key for user. The upload location of the key file, including IP address and filename, an must be set using the -u command option. | users -upld -n user_name -ki key_index -kf key_format -u URL where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Export (download) SSH public key | Export (download) the specified SSH public key. The download location of the key file, including IP address and filename, and must be set using the -u command option. | users -dnld -n user_name -ki key_index -kf key_format -u URL where:
| Primary CMM:
|
Display SSH public key information (summary) | Displays SSH public key information summary for the specified user. | users -u user_name -ki key_index where:
| Primary CMM:
|
Display complete SSH public key information | Displays complete SSH public key information for the specified user. Note When displaying complete key information, you can only specify one key index each time you run the command. | users -u user_name -ki key_index -kf key_format -e where:
| Primary CMM:
|
Update SSH public key | Updates the information for the specified SSH public key for the specified user. Information that can be updated includes:
| users -n user_name -ki key_index -kf key_format -key " key" -af " host_list" -cm " comment" where:
(continued on next page) | Primary CMM:
|
Update SSH public key (continued) | This command can only be run by users who have one or more of the following command authorities:
| ||
Update user SNMPv3 information | Updates the SNMPv3 information for the specified user. Information that can be updated includes:
Note SNMPv3 related command options can also be modified singly for each specified user. | users -n user_name -cn "context_name" -ap authentication_protocol -pp privacy_proto -ppw privacy_pwd -at access_type -i hostname/ip_address where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Enable / disable compute node and I/O module account management by CMM | Enables management by CMM of the IPMI and SNMPv3 user accounts for compute nodes and of the SNMPv3 user accounts for I/O Modules. This command option allows the CMM user accounts to be used for managing most compute nodes and I/O modules in the chassis instead of having management device user accounts manage the compute nodes and the I/O modules. Important Management of compute node IPMI and SNMPv3 user accounts is not supported by POWER-based compute nodes and by I/O modules with firmware versions lower than 8.4.3. Note
| users -am state -prov_target target where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Enable / disable SNMPv3 and/or IPMI centralized management | Enables or disables centralized management of SNMPv3 and/or IPMI user accounts, including user provisioning. This command enables you to control whether or not specific CMM user accounts can be used to manage chassis components (including provisioning). There can be up to 12 provisioned user accounts for nodes and up to 12 provisioned user accounts for I/O modules. Remember that enabling a user account will not actually allow local management of chassis components unless you have enabled compute node and/or I/O module account management by CMM using the users -am enabled command option. Note Disabling centralized IPMI and SNMPv3 management (provisioning) of a user account deletes the centrally managed user account. If there is a corresponding local account for this user on the CMM, it will remain functional. | users -ipmisnmpv3 state -n user_name -prov_target target where:
This command can only be run by users who have one or more of the following command authorities:
| Primary CMM:
|
Change new user creation method | Changes new user creation method. There are two available:
See User authority management for more information. Note An email server must be configured in network settings before“username&email” method can be selected (see | users -nucm state where state is username&password or username&email: | Primary CMM:
|
users -add -n user3 -p passw0rd -g super -ms 10
users
users -n test
users -n test -add -kf openssh -key "ssh-rsa AAAAB3NzaC1yc2EAAAA
BIwAAAQEAvfnTUzRF7pdBuaBy4dO/aIFasa/Gtc+o/wlZnuC4aDHMA1UmnMyLOCiIaNOy4OOICEKCq
jKEhrYymtAoVtfKApvY39GpnSGRC/qcLGWLM4cmirKL5kxHNOqIcwbT1NPceoKHj46X7E+mqlfWnAh
hjDpcVFjagM3Ek2y7w/tBGrwGgN7DPHJU1tzcJy68mEAnIrzjUoR98Q3/B9cJD77ydGKe8rPdI2hIE
pXR5dNUiupA1Yd8PSSMgdukASKEd3eRRZTBl3SAtMucUsTkYjlXcqex1OQz4+N50R6MbNcwlsx+mTE
AvvcpJhuga70UNPGhLJMl6k7jeJiQ8Xd2pXbOZQ=="
users -n test -ki 1
users -n test -ki all
users -n test -ki 1 -kf openssh -e
users -n test -dnld -ki 1 -kf openssh -u tftp://9.72.216.40/file.key
users -n test -upld -ki 1 -kf openssh -u tftp://9.72.216.40/file.key
users -n test -ki 1 -remove
users -n test -ki all -remove
The following example shows the information that is returned from these commands:
system:mm[2]> users -add -n user3 -p passw0rd -g super -ms 10
OK
system:mm[2]> users
Node provisioning: disabled
I/O module provisioning: disabled
Users
=====
USERID
Group(s): supervisor
1 active session(s)
Max 0 session(s) allowed
Account is active
Password is not expired
Password is compliant
There is no SSH public key installed for this user
IPMI and SNMPv3 user provisioning for nodes is disabled
SNMPv3 user provisioning for I/O modules is disabled
user3
Group(s): super
0 active session(s)
Max 10 session(s) allowed
Account is active
Password is not expired
Password is compliant
There is no SSH public key installed for this user
IPMI and SNMPv3 user provisioning for nodes is disabled
SNMPv3 user provisioning for I/O modules is disabled
test
Group(s): opmin
0 active session(s)
Max 2 session(s) allowed
Account is active
Password is not expired
Password is compliant
Number of SSH public keys installed for this user: 2
IPMI and SNMPv3 user provisioning for nodes is disabled
SNMPv3 user provisioning for I/O modules is disabled
User Permission Groups
======================
supervisor
Role:supervisor
Blades:1|2|3|4|5|6|7|8|9|10|11|12|13|14
Chassis:1
Modules:1|2|3|4|5|6|7|8|9|10
operator
Role:operator
Blades:1|2|3|4|5|6|7|8|9|10|11|12|13|14
Chassis:1
Modules:1|2|3|4|5|6|7|8|9|10
opmin
Role:operator
Blades:n/a
Chassis:n/a
Modules:n/a
system:mm[2]> users -n test
-g opmin
<span className="ph">-ms 5
-cn admin
-ap sha
-pp des
-at set
-i 0.0.0.0
</span>Node provisioning: -ipmisnmpv3 disabled
I/O module provisioning: -snmpv3 disabled
0 active session(s)
Max 2 session(s) allowed
Account is active
Password is not expired
Password is compliant
Number of SSH public keys installed for this user: 2
Last login: Never
system:mm[2]> users -n test -add -kf openssh -key "ssh-rsa AAAAB3NzaC1yc2EAAAA
BIwAAAQEAvfnTUzRF7pdBuaBy4dO/aIFasa/Gtc+o/wlZnuC4aDHMA1UmnMyLOCiIaNOy4OOICEKCq
jKEhrYymtAoVtfKApvY39GpnSGRC/qcLGWLM4cmirKL5kxHNOqIcwbT1NPceoKHj46X7E+mqlfWnAh
hjDpcVFjagM3Ek2y7w/tBGrwGgN7DPHJU1tzcJy68mEAnIrzjUoR98Q3/B9cJD77ydGKe8rPdI2hIE
pXR5dNUiupA1Yd8PSSMgdukASKEd3eRRZTBl3SAtMucUsTkYjlXcqex1OQz4+N50R6MbNcwlsx+mTE
AvvcpJhuga70UNPGhLJMl6k7jeJiQ8Xd2pXbOZQ=="
OK
system:mm[2]> users -n test
-g opmin
<span className="ph">-ms 5
-cn admin
-ap sha
-pp des
-at set
-i 0.0.0.0
</span>Node provisioning: -ipmisnmpv3 disabled
I/O module provisioning: -snmpv3 disabled
0 active session(s)
Max 2 session(s) allowed
Account is active
Password is not expired
Password is compliant
Number of SSH public keys installed for this user: 3
Last login: Never
system:mm[2]> users -n test -ki 1
ssh-rsa 2048 bits 69:d0:2d:4e:72:09:88:0d:ff:63:87:2c:26:5d:f6:f2
-af
-cm
system:mm[2]> users -n test -ki all
Key 1
ssh-rsa 2048 bits 69:d0:2d:4e:72:09:88:0d:ff:63:87:2c:26:5d:f6:f2
-af
-cm
Key 2
ssh-rsa 2048 bits 69:d0:2d:4e:72:09:88:0d:ff:63:87:2c:26:5d:f6:f2
-af
-cm
Key 3
ssh-rsa 2048 bits 69:d0:2d:4e:72:09:88:0d:ff:63:87:2c:26:5d:f6:f2
-af
-cm
system:mm[2]> users -n test -ki 1 -kf openssh -e
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvfnTUzRF7pdBuaBy4dO/aIFasa/Gtc+o/wlZnuC4aD
HMA1UmnMyLOCiIaNOy4OOICEKCqjKEhrYymtAoVtfKApvY39GpnSGRC/qcLGWLM4cmirKL5kxHNOqI
cwbT1NPceoKHj46X7E+mqlfWnAhhjDpcVFjagM3Ek2y7w/tBGrwGgN7DPHJU1tzcJy68mEAnIrzjUo
R98Q3/B9cJD77ydGKe8rPdI2hIEpXR5dNUiupA1Yd8PSSMgdukASKEd3eRRZTBl3SAtMucUsTkYjlX
cqex1OQz4+N50R6MbNcwlsx+mTEAvvcpJhuga70UNPGhLJMl6k7jeJiQ8Xd2pXbOZQ==
system:mm[2]> users -n test -dnld -ki 1 -kf openssh -u tftp://9.72.216.40/file.key
OK
system:mm[2]> users -n test -upld -ki 1 -kf openssh -u tftp://9.72.216.40/file.key
OK
system:mm[2]> users -n test -ki 1 -remove
OK
system:mm[2]> users -n test -ki all -remove
OK