Search

16.6. Administering User Tasks From the Administration Portal

download PDF

16.6.1. Adding Users and Assigning User Portal Permissions

Users must be created already before they can be added and assigned roles and permissions. The roles and permissions assigned in this procedure give the user the permission to log in to the User Portal and to start creating virtual machines. The procedure also applies to group accounts.

Procedure 16.7. Adding Users and Assigning User Portal Permissions

  1. On the header bar, click Configure to open the Configure window. Click System Permissions.
  2. Click Add to open the Add System Permission to User window.
  3. Select a profile under Search. The profile is the domain you want to search. Enter a name or part of a name in the search text field, and click GO. Alternatively, click GO to view a list of all users and groups.
  4. Select the check boxes for the appropriate users or groups.
  5. Select an appropriate role to assign under Role to Assign. The UserRole role gives the user account the permission to log in to the User Portal.
  6. Click OK.
Log in to the User Portal to verify that the user account has the permissions to log in.

16.6.2. Viewing User Information

You can view detailed information about each user in the Users tab.

Procedure 16.8. Viewing User Information

  1. Click the Users tab to display the list of authorized users.
  2. Select the user, or perform a search if the user is not visible on the results list.
  3. The details pane displays for the selected user, usually with the General tab displaying general information, such as the domain name, email and status of the user.
  4. The other tabs allow you to view groups, permissions, quotas, and events for the user.
    For example, to view the groups to which the user belongs, click the Directory Groups tab.

16.6.3. Viewing User Permissions on Resources

Users can be assigned permissions on specific resources or a hierarchy of resources. You can view the assigned users and their permissions on each resource.

Procedure 16.9. Viewing User Permissions on Resources

  1. Click the resource tabs, and select a resource in the results list.
  2. Click the Permissions tab of the details pane to list the assigned users, the user's role, and the inherited permissions for the selected resource.

16.6.4. Removing Users

When a user account is no longer required, remove it from Red Hat Virtualization.

Procedure 16.10. Removing Users

  1. Click the Users tab to display the list of authorized users.
  2. Select the user to be removed. Ensure the user is not running any virtual machines.
  3. Click the Remove button. A message displays prompting you to confirm the removal. Click OK.
The user is removed from Red Hat Virtualization, but not from the external directory.

16.6.5. Viewing Logged-In Users

You can view the users who are currently logged in, along with session times and other details. Click the Active User Sessions entry in the tree pane to view the details of the session for each logged-in user.
The Active User Sessions tab displays the Session DB ID, User Name, Authorization provider, User id, Source IP, Session Start Time, and Session Last Active Time.

16.6.6. Terminating a User Session

You can terminate the session of a user who is currently logged in.

Procedure 16.11. Terminating a User Session

  1. Click the Active User Sessions entry in the tree pane.
  2. Select the user session to be terminated.
  3. Click Terminate Session.
  4. Click OK.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.