This panel lets you exclude users from being covered by the per-user license entitlement. For example, you might not want a user such as Administrator to consume a license even if the user is associated with an installation of one of the entitlement’s discovered products.
You add users to the list to exclude them. The following information is provided for each excluded user:
Name: If the authoritative user source is serving as the configured user source, this field displays the user’s login name as defined in the authoritative source. If the Inventory data is the configured user source, this field displays the user’s full name (first, middle, and last).
Last Name: The user’s last name as defined in the user source.
Phone Number: The user’s phone number as defined in the user source.
In Folder: If the authoritative user source is serving as the configured user source, this field displays the user’s location in the authoritative source. If the configured user source is the inventory data, this field does not apply and contains no information.
Deleted from Source: When an excluded user is deleted from the user source, the user is not automatically removed from the panel. Instead, a check mark is added to this column. This ensures that no excluded users disappear from the list without you knowing about it. If you don’t want to retain the user in the list, you can remove the user.
Installed Quantity: The number of installations of the entitlement’s discovered products associated with the user. How this number is determined depends on the configured user source (authoritative or inventory).
With the authoritative user source, the installed quantity is determined by the number of installations on devices for which the user is designated as the primary user (device Summary page >
field).With the inventory user source, the installed quantity is determined by the number of installations on devices for which the user is designated as the Entered User (device Inventory page > Detailed Hardware/Software Inventory Data report).
The following table lists the tasks you can perform to manage excluded users.
Task |
Steps |
Additional Details |
---|---|---|
Add a user from the authoritative user source to the list |
|
This task applies only if the user source being used is the authoritative user source (LDAP directory). If you are using inventory data as the user source, see the next task. |
Add a user from the inventory user source to the list |
|
This task applies only if the user source being used is the inventory data. If you are using the authoritative user source (LDAP directory) as the user source, see the previous task. |
Remove an excluded user |
|
|
For trademark and copyright information, see Legal Notices.