The following table describes NetMRI system privileges that can be assigned to roles.
Privilege | Description |
---|---|
Configure Networks | A system privilege applied to SysAdmin roles. Allows adding of new networks, changing Network View mappings, and mapping local VRFs to networks. |
Switch Port Admin | A system privilege applied to Switch Port Administrator Roles. This Privilege allows the Role to perform the following tasks:
|
Collection: Poll On-Demand | Users with this privilege can perform on-demand polling of individual network devices for the admin account using this privilege. |
View: Non Sensitive | Ability to view all non-sensitive information in NetMRI, such as Issues, Changes, audit logs, and device states through the Device Viewer. Users with these privileges cannot carry out the following:
|
View: Sensitive | Ability to view all sensitive information in NetMRI, including policy compliance configurations, device configurations in Configuration Management, configuration of user accounts, and Setup, Licensing, and Database tasks otherwise not accessible by View: Non Sensitive privileges. |
View: NetMRI System Info | Ability to view NetMRI appliance settings. |
View: System Health Banner | Ability to view NetMRI system health banners. The privilege is automatically added to all roles except for the FindIT role. After upgrading your NetMRI software from a previous version where the Hide the system banners from non-admin users advanced setting was enabled, only the SysAdmin role has the View: System Health Banner privilege. To add the provilege to a role, go to the Settings icon > User Admin > Roles and add the privilege to the role. For more information, see Defining and Editing Roles. |
Custom Data: Input Data | A privilege allowing non-Admin user accounts to edit and enter information in custom data fields previously created by the Admin account. For example: for network devices, custom fields are useful for recording important contextual data such as asset tag numbers and physical location — information that NetMRI does not gather on its own. By default, the Admin account is the only account with permissions to edit such data fields. For more information, see Defining and Using Custom Fields and Enabling Custom Data Field Editing for Non-Admin Users. |
System Administrator | Allows the user complete access to the NetMRI appliance. |
Reset Passwords | A privilege that allows a user to change passwords other than their own. |
User Administration | A privilege that allows a user to create users, and assign roles and privileges. |
Issues: Modify Parameters | A privilege that allows a user to define and change analysis parameters, including analysis schedules. |
Issues: Modify Suppression Parameters | A privilege that allows a user to modify issue suppression parameters. |
Issues: Modify Priority | A privilege that allows a user to set the priority of issues. |
Issues: Define Notifications | A privilege that allows a user to define notifications for the issues. |
Scripts: Author | Author scripts and packaged commands, and save them for re-use by others. |
Scripts: Approve 1 | Approve packaged scripts and commands designated level 1 (low risk). |
Scripts: Approve 2 | Approve packaged scripts and commands designated level 2 (medium risk). |
Scripts: Approve 3 | Approve packaged scripts and commands designated level 3 (high risk). |
Scripts: Execute 1 | Execute packaged scripts and commands designated level 1 (low risk). |
Scripts: Execute 2 | Execute packaged scripts and commands designated level 2 (medium risk). |
Scripts: Execute 3 | Execute packaged scripts and commands designated level 3 (high or unknown risk). |
Scripts: Schedule 1 | Schedule packaged scripts and commands designated level 1 (low risk). |
Scripts: Schedule 2 | Schedule packaged scripts and commands designated level 2 (medium risk). |
Scripts: Schedule 3 | Schedule packaged scripts and commands designated level 3 (high or unknown risk). |
Policy: Create, Edit, and Delete | Create, edit, and delete policies and policy rules. |
Policy: Deploy | Ability to assign the device groups against which a policy is checked. |
Events: Admin | Ability to create event symptoms. |
Groups: Create | Ability to create and edit device and/or interface groups in NetMRI. |
Groups: Result Sets | Ability to create and edit result sets. |
Groups: Delete | Ability to remove the device and/or interface groups. |
Terminal: Modify Credentials | Allow the user to modify their own CLI credentials. This privilege restricts/allows users with the given role to change their own CLI credentials (Settings > User Admin > edit User > CLI Credentials). By default, this tab is disabled for user accounts without this privilege. NetMRI roles that have this privilege by default include SysAdmin, UserAdmin, and ChangeEngineer High. For roles other than those noted, this privilege is manually assigned. |
| Allow users to activate Telnet/SSH sessions from the right-click menu. Should a user account not have this privilege, a popup message appears explaining that they do not have sufficient privileges to use this feature. NetMRI roles with this privilege include SysAdmin, UserAdmin, ChangeEngineer High, and ChangeEngineer Medium. For roles other than those noted, this privilege is assigned manually. |
Terminal: Use NetMRI Creds | Allow the user to log in to devices using the default login/enable credential associated with the device within NetMRI. These are not vendor default credentials. If a terminal session is opened and the user has the appropriate privileges, the terminal shell queries the device credentials based on status and connection type and attempts a login using those if they are available. If not, a username and password are requested from the user. |
Tools: All | Allows access to all available Network Tools in NetMRI. |
Tools: Ping/Traceroute | Allows access to the NetMRI Ping/Traceroute Tool. |
Tools: Path Diagnostics | Allows access to the NetMRI Path Diagnostic Tool. |
Tools: SNMP Walk | Allows access to the NetMRI SNMP Walk Tool. |
Tools: Cisco Cmd Tool | Allows access to the NetMRI Cisco Command Tool. |
Tools: Discovery Diag | Allows access to the NetMRI Discovery Diagnostics Tool. |
Tools: FindIT | Allows access to the NetMRI FindIT Tool. |
Privileges cannot be edited or deleted, and new Privileges cannot be created.