Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The roles management screen is available regardless of whether your user management is with DPOD's internal database registry or LDAP.
The screen is accessible by clicking [Manage→SecurityRoles] from The Navigation Bar.

There are two types of security roles available with DPOD:

  • Custom Roles - defined by the administrator. These roles may be added, deleted or altered by a DPOD Administrator.
  • Built-in Roles - these are DPOD's own built-in roles, which can not be added, deleted or altered. 

The roles are used to provide a means for the administrator to filter the view users have of the system. Administrators can use the roles to filter out devices, domains, services, Client IP addresses, payload and more from a user's view, thereby providing each user with insights to only the parts of the system they are allowed to access.

Custom Roles Table

The custom roles widget at the top of the screen lists the custom roles defined in the system in a table. Each row in the table contains the following information for a single role:

Column
Description
NameThe role's name. 
Clicking on a role's name will load the role's details in the Role View and provide access to system actions for the role. 
DescriptionThe description for this role

...

The Role Details section below provides information about the details required for adding or editing custom roles.

Built-In Roles Table

The built-in roles widget at the top of the screen lists the built-in roles defined in the system in a table. Each row in the table contains the following information for a single role:

Column
Description
NameThe role's name. 
Clicking on a role's name will load the role's details in the Role View and provide access to system actions for the role. 
DescriptionThe description for this role

...

  • The field contains a comma-separated list of values to allow or deny.
  • Wildcards are not allowed.
  • When left blank, the field does not affect access.

Effective Access Rights

A user may be assigned with several custom roles, directly or via groups. The effective access rights of a user is calculated according to the rules described below:

...