...
Note | ||
---|---|---|
| ||
Privileges play a key part in Roles configuration. Each of the pre-defined roles uses a specific collection of Privileges, which are pre-defined administrative functions that cannot be edited or changed. You can delete Privileges from a defined Role and create new Roles with custom sets of Privileges. Also, see see Privilege Descriptions for for details on the Privileges comprising user Roles. |
...
NetMRI provides a set of pre-defined Roles with specific privileges in NetMRI, as follows:
Analysis Admin | Specializes in creating and managing NetMRI Issues. Assigned privileges include Issues: Modify Parameters, Issues: Modify Suppression Parameters, Issues: Modify Priority, Issues, Define Notifications, and View: Non Sensitive. |
Change Engineer: High | Allowed to author, approve, execute, and schedule scripts designated High Level (Level 3) and lower. Privileges include the following:
This role can launch SSH and Telnet sessions using NetMRI's Telnet/SSH Proxy feature using User Credentials (Terminal: Open Session privilege). This role can modify CLI credentials (Terminal: Modify Credentials privilege). |
Change Engineer: Medium | Allowed to author, approve, execute, and schedule scripts designated Medium Level (Level 2) and lower. Privileges include the following:
This role can launch SSH and Telnet sessions using NetMRIs Telnet/SSH Proxy feature (Terminal: Open Session privilege) using NetMRI default credentials. By default, this role cannot modify CLI credentials. |
Change Engineer: Low | Allowed to author, approve, execute, and schedule scripts designated Low Level (Level 1). Privileges include the following:
Users with this role cannot launch SSH or Telnet sessions and those options will not appear in the device shortcut menu (right-clicking on a device's IP address, a VLAN IP, and other elements in the NetMRI UI). By default, this role cannot modify CLI credentials. |
Config Admin | A read-only account that is allowed to view all sensitive data in NetMRI. Privileges include View: Audit Log, View: Sensitive, and View: Non-Sensitive. |
Default View Role | A read-only account that is allowed to view only non-sensitive data. Privileges include View: Non-Sensitive. |
Event Admin | Event system administrator. Privileges include Events: Admin which enables the creation of new Event Symptoms, and View: Non-Sensitive. |
FindIT | Allows access only to the NetMRI FindIT tool. |
Group Manager | Creates and manages interface groups, device groups, and related result sets. Privileges include Groups: Create, Groups: Delete, Groups: Result Sets, View: Non-Sensitive, and View: Sensitive. |
Network Security Engineer | Allows users to provision ACL / firewall rules. Privileges include the following:
|
Policy Manager | Creates and manages Policies for one or more Groups in NetMRI to standardize and lockdown configurations for networked devices such as routers, switches, and firewalls. Privileges include Policy: Deploy, Policy: Create, Edit and Delete, View: Audit Log, View: Non-Sensitive, and View: Sensitive. |
Report Admin | Role to allow the creation and editing of Report features in NetMRI. Associated privileges include Reports: Report Manager, View: Non-Sensitive, and View: Sensitive. |
Switch Port Administrator | Allows users to make changes to switch port configurations. Privileges include the following:
|
SysAdmin | The global administrator account Role for NetMRI. Includes the System Administrator privilege and View: Audit Log. SysAdmins can manage, add, and remove scan interfaces and map them to networks, manage, add, and remove network views. |
User Admin | Create and edit NetMRI user accounts and Roles, and assign privileges. Includes View: Audit Log, View: Non-Sensitive, User Administrator, Reset Passwords, and Issues: Define Notifications. |
You can create custom Roles, with custom sets of privileges to suit the needs of your organization. You can add and remove privileges and user accounts from each of the pre-defined Roles in the NetMRI appliance. See Defining and Editing Roles for more information.
...