Logo

Search Users

Menu path: Users > Search Users.

This page lists all or a filtered list of users along with several key pieces of information.

The general format and usage of this page is discussed in General GUI Usage.

The view offers selectable columns (with the select columns icon symbol); the initial default columns are:

Actions

Each list entry has a check box to the left of the user name. Any number of entries can be checked; all of the entries are checked by checking the box to the left of the Username title. The configu icon drop-down list is used to choose an action to be applied to all the selected items:

Action Usage
Clear Security Event Erases any security event associated with the user.
Register Registers the devices associated with the user.
Deregister Deregisters the devices associated with the user.
Reevaluate Access Use the current authentication settings to reevaluate the user's access.
Refresh Fingerbank Retry FIngerbank identification of the user's devices.
Apply Role

Associates a role with the user. The roles are those defined in Configuration > Policies and Access ControlRoles.

Apply Bypass Role

Associates a bypass role with the user. The roles are those defined in Configuration > Policies and Access ControlRoles. Bypass roles override the role set during authentication

Apply Security Event

Associates a security event with the user. The security events are:

  • Bandwidth Limit
  • Connection transport change
  • Generic
  • Hostname change
  • Lost or Stolen
  • Nessus Scan
  • OpenVAS scan
  • Parking security event
  • Post Reg System Scan
  • Pre Reg System Scan
  • Provisioning Enforcement
  • Rogue DHCP
  • Spam
  • System Scan
  • Time Expiration
  • Wireless IPS

Simple Searches

The simple search choice offers a straightforward means of searching user entries:

Advanced Searches

Select the advanced switch on slider to access the advanced searches page. Multiple or conditions are joined together with and conjunctions. Each element of an or set can be deleted with the delete iconsymbol or reordered by selecting the item's grid icon symbol. Reordering can occur across or sets.

Several facilities exist for saving and using saved searches:

Each condition requires three parts:

Editing User Entries

Several tabs display or edit user entries:

Tab Label Fields
Profile
  • Username (PID)
  • Email
  • Sponsor
  • Language
  • Gender
  • Title
  • Firstname
  • Lastname
  • Nickname
  • Company
  • Telephone Number
  • Mobile Phone Number
  • Work Phone Number
  • Apartment Number
  • Building Number
  • Room Number
  • Address
  • Anniversary
  • Birthday
  • Pre-Shared Key
  • Notes
Password
  • Password - enter a value to change the login password, followed by use of the reset password icon button. The generate password icon icon can be used to generate a password that adheres to multiple criteria and the examine icon icon can be used to make the password visible.
  • Logins remaining - if a login limit is in effect, the number remaining is displayed here. Otherwise, unlimited logins are available.
Actions
  • Registration Window - the dates between which a user is considered registered.
  • Actions - the actions to perform when a user registers. Actions are added through the use of the add icon button and deleted through the use of the delete icon button. The available actions are discussed in Registration Actions below.
Custom Fields Nine fields used for new user fields.
Devices The list of devices associated with the user.
Security Events The list of security events associated with the user.

Registration Actions

The available registration actions are:

Action Usage Example
Set tenant ID Associates the user with a particular tenant in a multi-tenant scenario. 1
Access Duration Sets the access duration for the user. 12 hours
Access Level Change the administrative access level. One or more of the default or added administrative roles can be selected. These are discussed in System ConfigurationAdmin Access. ALL
Mark as Sponsor The user can act as a sponsor for guest logins.  
Role Sets the user's role. One of the items defined in Configuration > Policies and Access Control > Roles. guest
Unregistration Date The date on which the user will be automatically deregistered. 2020-07-01
Time balance The aggregate amount of connection time that the user has available until automatic deregistration. 12 hours
Bandwidth balance The aggregate amount of bandwidth consumption that the user has available until automatic deregistration. <??? units ???> 100MB

Copyright © 2021 Extreme Networks. All rights reserved. Published April 2021.