Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

DPOD uses Role Based Access Control to splice user access to the information available through the system.

...

DPOD supports two types of user and groups group registries:

  • DPOD's internal database registry
  • Lightweight Directory Access Protocol (LDAP) user registry

...

Configuring DPOD to use LDAP user registry is described in Configuring LDAP.

Security Roles

Security roles are used to provide a means for the administrator to filter the view users have of the system. Administrators can use the roles to filter out devices, domains, services, client IP addresses, payload and more from a user's view, thereby providing each user with insights to only the parts of the system they are allowed to access.

There are two types of security roles available with DPOD:

  • Built-in Roles - DPOD's own built-in roles, which can not be added, deleted or altered.
  • Custom Roles - defined by the administrator. These roles may be added, deleted or altered by a DPOD Administrator.

...