Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

By default, the Grid Master denies access to Grid members when a limited-access admin group does not have defined permissions. You can grant an admin group read-only or read/write permission, or deny access to all Grid members or you can grant permission to specific Grid members, as described in in Applying Permissions and Managing Overlaps.

Note
titleNote

Only superusers can modify DNS and DHCP Grid properties.

The following sections describe the types of permissions that you can set with Grid permissions:

...

Table of Contents
maxLevel1

Administrative Permissions for Grid Members

Table 4.8 The following table lists the tasks admins can perform and the required permissions for Grid members.
AnchorTable 4.8Table 4.8
Table 4.8
Grid Member Permissions

bookmark502

GridMember(s)

Tasks

Anchor
Administrative Permissions for Network DAdministrative Permissions for Network D
Anchor
bookmark500bookmark500
Anchor
bookmark501bookmark501
Anchor

bookmark502

Member DNS Properties

Member DHCP Properties

Restart Member DNS

Restart Member DHCP

DNS Views

DNS Zones

Networks

DHCP Ranges

Assign member to DNS zones




RW



RW



Assign member to networks





RW



RW


Assign member to DHCP ranges









RW

Configure member properties

RW









Add a member to a Match Members list of a DNS view

RW









Delete a view with members in a Match Members list






RO




View DNS and DHCP member properties


RO

RO







View and download syslog

RO









View DNS and DHCP configuration file


RO

RO







View network statistics

RO









Restart DNS service on the member




RW






Restart DHCP service on the member





RW





...

Limited-access admin groups can initiate a discovery and manage discovered data based on their administrative permissions.
You can set global permissions for network discovery as described in Defining Global Permissions. The following table lists the tasks admins can perform and the required permissions for network discovery.
Table 4.9 Permissions for Network Discovery

...

You can schedule tasks, such as adding hosts or modifying fixed addresses, for a future date and time. To schedule tasks, you must first enable the scheduling feature at the Grid level, and then define administrative permissions for admin groups and admin roles. For information, see Scheduling Tasks. Only superusers can enable and disable this feature and grant scheduling permissions to admin groups. Limited-access admin groups can schedule tasks only when they have scheduling permissions.
Superusers can do the following:

...

You can set global permissions to schedule tasks as described in Defining Global Permissions. The following table lists the tasks admins can perform and the required permissions. Users with read/write permission to scheduling can view, reschedule, and delete their own scheduled tasks.
Table 4.10 Scheduling Task Permissions

AllDNSViewsbookmark505

Tasks

Scheduling Task

All Networks

anchor

bookmark504bookmark504
Anchor
Administrative Permissions for MicrosoftAdministrative Permissions for Microsoft
Anchor
bookmark505

All Shared Record Groups

Schedule the addition, modification, and deletion of all supported object types

RW

RW

RW

RW

View, reschedule, and delete scheduled tasks

RW

RW

RW

RW

Convert unmanaged data to a host, fixed address, reservation, A record, or PTR record

RW

RW

RW


To schedule tasks for specific resources, admins must have Read/Write permission to scheduling tasks, plus the required permissions to the supported resources. For information about permissions for specific resources, see the following:

...

By default, only superusers can add Microsoft servers as managed servers to the Grid. Limited-access admins can add and manage Microsoft servers from the Grid based on their administrative permissions.
The following table lists the tasks admins can perform and the required permissions. Note that only superusers can add a Microsoft server to a name server group.
Table 4.11
Microsoft Server Permissions

bookmark506

Tasks

Anchor
Administrative Permissions for IPAM ResoAdministrative Permissions for IPAM Reso
Anchor
bookmark506

Microsoft Server(s)

Grid Member(s)

Network Views

DNS Views

DNS Zones

Resource Records

Networks

DHCP Ranges

Superscopes

Assign Microsoft server to member

RW

RW








Assign a network view to the Microsoft server

RW

RW

RW







Assign a DNS view to the Microsoft server

RW

RW


RW






Assign Microsoft server as primary or secondary to DNS zones

RW



RW

RW





Remove a Microsoft server as the primary or secondary server of a zone





RW





Remove a zone from a Microsoft server





RW





Edit zones and resource records of Microsoft servers





RW

RW




Assign a Microsoft server to a network

RW






RW



Assign a Microsoft server to a DHCP range

RW







RW


Remove a network served by a Microsoft server

RW






RW



Remove a DHCP range (scope) from a Microsoft server







RW

RW


Add, modify and remove Microsoft superscopes

RW







RW

RW

Clear leases from Microsoft server

RW







RW


Edit Microsoft server properties

RW









View Microsoft server properties

RO









View and download Microsoft logs

RO









Start/Stop DNS or DHCP on the Microsoft server

RW









Remove a Microsoft server from the Grid

RW









...