Chapter 3: Building Your Storage Space ● 27Starting and Logging In on the Local SystemThis section describes how to start and log in to the full Adaptec Storage Manager application.It also explains how Adaptec Storage Manager uses existing operating system permission levelsto grant different amounts of access to your storage space.Understanding Permission LevelsWhen you log in to Adaptec Storage Manager, your permission level is identical to youroperating system permission level. For example, if you have Administrator permissions onyour operating system, you also have Administrator permissions in Adaptec Storage Manager.This section describes the three different permission levels.Administrator LevelLogging in as an Administrator allows you full access to manage and modify the controllers,disk drives, and logical drives that are part of your storage space.To log in as an Administrator:● Windows—Enter a valid user name and password for the Administrator or AdministrativeUser on the system. (The Administrative User is any member of the local Administratorsgroup, which can, in a Domain configuration, include Domain Administrators.)● Linux—Enter root for the user name and enter the root password.● UnixWare or OpenServer—Enter root for the user name and enter the root password.● Solaris—Enter root for the user name and enter the root password.User LevelLogging in as a User partially restricts your access to the storage space, as described in this table.To log in as a User, use your normal network user name and password.Guest LevelLogging in as a Guest restricts your access to the storage space to “view-only”.You can see all local and remote systems and view their properties windows, view event logs,save configuration files and support archives, and browse the online Help.You cannot make any changes to the storage space.To log in as Guest, click Cancel on the Login window.Users can... User’s can’t...Rescan controllers Create logical drivesSave activity logs Modify logical drivesVerify disk drives (with and without fix) Delete logical drivesVerify logical drives (with and without fix) Delete hot sparesIdentify disk drives and enclosures Perform data migrationsRebuild disk drivesCreate hot sparesAccess the same information as Guests (see the following section)