Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The screen is accessible by clicking [Manage→SecurityRoles] from The Navigation Bar.

Note

The security roles management screen is always available, regardless of whether the system is managing users using DPOD internal database registry or LDAP.

There are two types of security roles available with DPOD:

  • Custom Roles - defined by the administrator. These roles may be added, deleted or altered by a DPOD Administrator.
  • Built-in Roles - these are DPOD's own built-in roles, which can not be added, deleted or altered. 

The roles are used to provide a means for the administrator to filter the view users have of the system. Administrators can use the roles to filter out devices, domains, services, client IP addresses, payload and more from a user's view, thereby providing each user with insights to only the parts of the system they are allowed to access.

 Custom Roles Table

The custom roles widget at the top of the screen lists the custom roles defined in the system in a table. Each row in the table contains the following information for a single role:

Column
Description
NameThe role's name. 
Clicking on a role's name will load the role's details in the Role View and provide access to system actions for the role. 
DescriptionThe description for this role

...

The Role Details section below provides information about the details required for adding or editing custom roles.

Built-In Roles Table

The built-in roles widget at the top of the screen lists the built-in roles defined in the system in a table. Each row in the table contains the following information for a single role:

Column
Description
NameThe role's name. 
Clicking on a role's name will load the role's details in the Role View and provide access to system actions for the role. 
DescriptionThe description for this role

...

DetailContent Description
NameThe name of this role
DescriptionThe description of this role.
Allowed Devices
(For custom roles only
A comma-separated list of devices this role provides access to or N/A when the role is not used to allow device access.
Denied Devices
(For custom roles only) 
A comma-separated list of devices this role denies access to or N/A when the role is not used to deny device access. 
Allowed Domains
(For custom roles only) 
A comma-separated list of domains this role provides access to or N/A when the role is not used to allow domain access. 
Denied Domains
(For custom roles only) 
A comma-separated list of domains this role denies access to or N/A when the role is not used to deny domain access. 
Allowed Services
(For custom roles only) 
A comma-separated list of services this role provides access to or N/A when the role is not used to allow service access. 
Denied Services
(For custom roles only) 
A comma-separated list of services this role denies access to or N/A when the role is not used to deny service access. 
Allowed Client IPs
(For custom roles only) 

A comma-separated list of client IP addresses this role provides access to or N/A when the role is not used to allow client IP access.

Denied Client IPs
(For custom roles only) 
A comma-separated list of client IP addresses this role denies access to or N/A when the role is not used to deny client IP access. 
Allow Raw Messages
(For custom roles only) 
Whether this role, when assigned to a user, allows them to view Raw Messages.
Allow Payload
(For custom roles only) 
Whether this role, when assigned to a user, allows them to view Messages Payload.

Manage Payload Capture
(For custom roles only)

Whether this role, when assigned to a user, allows them to manage payload capture.
Groups in RoleThis widget lists all the Security Groups assigned this role.
You may use the controls in this widget to remove or add a group association to this role.
Users in RoleThis widget lists all the Users assigned this role.
You may use the controls in this widget to remove or add a user association to this role.

...