Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

DPOD uses Role Based Access Control to splice user access to the information available through the system.

...

Note

This registry should only be used for non-production environments or during an evaluation process of DPOD.

For production environments, it is highly recommended to use an the only supported registry is the LDAP user registry.

LDAP User Registry

...

Configuring DPOD to use LDAP user registry is described in Configuring LDAP.

Security Roles

Security roles are used to provide a means for the administrator to filter the view users have of the system. Administrators can use the roles to filter out devices, domains, services, client IP addresses, payload and more from a user's view, thereby providing each user with insights to only the parts of the system they are allowed to access.

There are two types of security roles available with DPOD:

  • Built-in Roles - DPOD's own built-in roles, which can not be added, deleted or altered.
  • Custom Roles - defined by the administrator. These roles may be added, deleted or altered by a DPOD Administrator.

...