The User Management service enables you to create and manage login credentials for each user. You can also limit the accounts that each user can access to network and device
Only one username and password is required to access all network and devices that are available to the user.
You can control, for example:
- Restrictions on access to network and changes
- Allow changes to the device
- Allow changes to device or more network
- Restriction display menus
An access control list (ACL), with respect to access the network and devices, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation
On some types of proprietary computer hardware (in particular routers and switches), an access control list refers to rules that are applied to port numbers or IP addresses that are available on a host or other layer 3, each with a list of hosts and/or networks permitted to use the service here and a time limit for changes in the user is used and access to higher security policies brings.
User Activity Logs
UAM solutions transcribe all documented activities into user activity Network and Devices and archive and report document