Home » Features >> Managing Permissions
srch-icn
 

Mac User Management

 

The User Management configuration allows you to add, modify, or delete local users from the devices.

Step 1: Name the Configuration

Provide a name and description for the User Management Configuration.

Step 2: Define Configuration

You can perform the following actions:

Add User

To add an user to the computer, select the Add User link from the Choose User Action table andspecify the following:

Parameter

Description

User Name

The user name for the user to be created.

Full Name

The full name of the user.

Password

The password for this user.

Confirm Password

Confirm the password again.

Password hint

Enter Password hint

Overwrite if user already exist

Select this option to overwrite the user, if one with the same name exists.

Advanced Settings

Create user as hidden

Specify whether the user has to created as hidden by default.

Create user as admin

Specify whether the user has to be created as an administrator.

User Must change password at next logon

Specify whether the user has to change the password during the next logon or not.

User Cannot Change Password

Specify whether the user can change the password or not.

Password Never Expires

Specify whether the password should expire or not.

Account is Disabled

Specify whether the user account should be disabled or not.

Group

Add User

Specify the groups in which this user account is a member.

Set directory for user creation

If the user's home folder has to be stored in a network directory, select the drive letter in the Connect Map and specify the network path in the To field.

If you wish to add more users or to perform another action, click Add More Action button and continue. The values gets added to the List of Settings table.

Change Password

To change the user password, select the Change Password link from the Choose User Action table andspecify the following:

Parameter

Description

User Name

The user name of the user whose password has to be changed.

Old Password

Type the old password.

Password

Type the new password.

Confirm Password

Re-type the password to confirm.

Password hint

Enter the password hint.

If you wish to continue adding more actions, click Add More Action button and continue. The values gets added to the List of Settings table.

Remove User

To remove an user from the computer, select the Remove User link from the Choose User Action table andspecify the user to be removed.

If you wish to remove more users or to perform another action, click Add More Action button and continue. The values gets added to the List of Settings table.

Modify User

To modify an user, select the Modify User link from the Choose User Action table andspecify the following:

Parameter

Description

User Name

The user name of the user to be modified.

Full Name

The full name of the user.

Advanced Settings

Convert user as hidden

Specify whether the users' should be hidden or not

Convert user as admin

Specify whether the user should be admin or not

User Must change password at next logon

Specify whether the user has to change the password during the next logon or not.

User Cannot Change Password

Specify whether the user can change the password or not.

Password Never Expires

Specify whether the password should expire or not.

Account is Disabled

Specify whether the user account should be disabled or not.

Account is Locked

Specify whether the user account should be locked or not.

Group

Add User

Specify the groups in which this user account is a member.

Remove User

Specify the groups from which this user is to be removed as a member

If you wish to modify more users or to perform another action, click Add More Action button and continue. The values gets added to the List of Settings table.

To modify a setting from the List of Settings table, select the appropriate row and click icon and change the required values.

To delete a setting from the List of Settings table, select the appropriate row and click icon.

Step 3: Define Target

Using  the Defining Targets procedure, define the targets for deploying the User Management Configuration.

Step 4: Deploy Configuration

Click the Deploy button to deploy the defined User Management Configuration in the targets defined. The configuration will take effect during the next system startup.

To save the configuration as draft, click Save as Draft.

Thank you for your feedback!

Sorry about that!

By clicking "Submit", you agree to processing of personal data according to thePrivacy Policy.