2-5
User Guide for Cisco Unified Service Monitor
OL-9351-01
Chapter2 Data Management and System Administration
Configuring Users (ACS and Non-ACS)
Tabl e 2-2 lists Service Monitor log files by function or module. If you request assistance, the Technical
Assistance Center (TAC) might ask you to send them some of these log files.
Configuring Users (ACS and Non-ACS)
What Service Monitor users can see and do is determined by their user role. There are two different
mechanisms or modes for authenticating users:
Non-ACS—You select a supported login module to provide authentication and authorization. By
default, Common Services uses the CiscoWorks Local login module to assign roles, along with
privileges associated with those roles, as described in the Permission Report. (You can generate a
Permission Report by clicking the CiscoWorks link in the upper righthand corner of the Service
Monitor home page and selecting Common Services > Server > Reports > Permission Report >
Generate Report.) For more information, refer to Configuring Users Using Non-ACS Mode
(CiscoWorks Local Login Module), page 2-5.
ACS—In ACS mode, authentication and authorization is provided by Cisco Secure Access Control
Server (ACS). Cisco Secure ACS specifies the privileges associated with roles; however, Cisco
Secure ACS also enables you to perform device-based filtering, so that users only see authorized
devices. To use ACS mode, Cisco Secure ACS must be installed on your network and Service
Monitor must be registered with Cisco Secure ACS. For more information, refer to Configuring
Users Using ACS Mode, page 2-6.
If Operations Manager uses ACS mode for authentication and authorization and Service Monitor is
running on the same system, Service Monitor must also use ACS mode; otherwise, Service Monitor users
will not have any permissions.

Configuring Users Using Non-ACS Mode (CiscoWorks Local Login Module)

To add a user and specify their user role using CiscoWorks Local login module, select Administration >
Add Users. After the Common Services Local User Setup window opens, click the Help button for
information on the configuration steps.
Use the Permission Report to understand how each user role relates to tasks in Service Monitor.
Table2-2 Service Monitor Log Files by Module
Function/Module Log Files
Data Handler DataHandler.log
DataHandler_stdout.log
DataHandler_sterr.log
dhError.log
LicenseCheck.log
ServiceMonitorHistory.log
tftpmanager.log
trapgen.log
Skinny Server SkinnyServer.log
User Interface QovrUI.log