![]() |
Menu path: Users > Search Users.
This page lists all or a filtered list of users along with several key pieces of information.
The general format and usage of this page is discussed in General GUI Usage.
The view offers selectable columns (with the symbol); the initial default
columns are:
Each list entry has a check box to the left of the user name. Any number of
entries may be checked; all of the entries are checked by checking the box to the
left of the Username title.
The drop-down list is used
to choose an action to be applied to all the selected items:
Action | Usage |
---|---|
Clear Security Event | Erases any security event associated with the user. |
Register | Registers the devices associated with the user. |
Deregister | Deregisters the devices associated with the user. |
Reevaluate Access | Use the current authentication settings to reevaluate the user's access. |
Refresh Fingerbank | Retry FIngerbank identification of the user's devices. |
Apply Role |
Associates a role with the user. The roles are those defined in Configuration > Policies and Access Control > Roles. |
Apply Bypass Role |
Associates a bypass role with the user. The roles are those defined in Configuration > Policies and Access Control > Roles. Bypass roles override the role set during authentication |
Apply Security Event |
Associates a security event with the user. The security events are:
|
The simple search choice offers a straightforward means of searching user entries:
Click the slider
to access the advanced searches page. Multiple or conditions are joined
together with and
conjunctions. Each element of an or set may be deleted with the
symbol or reordered by
selecting the item's
symbol. Reordering may occur across or sets.
Several facilities exist for saving and using saved searches:
Each condition requires three parts:
Several tabs display or edit user entries:
Tab Label | Fields |
---|---|
Profile |
|
Password |
|
Actions |
|
Custom Fields | Nine fields used for new user fields. |
Devices | The list of devices associated with the user. |
Security Events | The list of security events associated with the user. |
Registration Actions
The available registration actions are:
Action | Usage | Example |
---|---|---|
Set tenant ID | Associates the user with a particular tenant in a multi-tenant scenario. | 1 |
Access Duration | Sets the access duration for the user. | 12 hours |
Access Level | Change the administrative access level. One or more of the default or added administrative roles may be selected. These are discussed in System Configuration > Admin Access. | ALL |
Mark as Sponsor | The user may act as a sponsor for guest logins. | |
Role | Sets the user's role. One of the items defined in Configuration > Policies and Access Control > Roles. | guest |
Unregistration Date | The date on which the user will be automatically deregistered. | 2020-07-01 |
Time balance | The aggregate amount of connection time that the user has available until automatic deregistration. | 12 hours |
Bandwidth balance | The aggregate amount of bandwidth consumption that the user has available until automatic deregistration. <??? units ???> | 100MB |
Copyright © 2020 Extreme Networks. All rights reserved. Published December 2020.