Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The roles management screen is available regardless of whether your user management is with DPOD's internal database registry or LDAP.
The screen is accessible by clicking [Manage→SecurityRoles] from The Navigation Bar.
There are two types of

Note

The security roles

...

  • Custom Roles - defined by the administrator. These roles may be added, deleted or altered by a DPOD Administrator.
  • Built-in Roles - these are DPOD's own built-in roles, which can not be added, deleted or altered. 

...

management screen is always available, regardless of whether the system is managing users using DPOD internal database registry or LDAP.


Security roles are used to provide a means for the administrator to filter the view users have of the system. Administrators can use the roles to restrict actions and filter out devices, domains, services, Client client IP addresses, payload and more from a user's view, thereby providing each user with insights to only the parts of the system they are allowed to access.

There are two types of security roles available with DPOD:

  • Built-in Roles - DPOD's own built-in roles, which can not be added, deleted or altered.
  • Custom Roles - defined by the administrator. These roles may be added, deleted or altered by a DPOD Administrator.

For a detailed explanation about security roles, see Role Based Access Control.

Custom Roles Table

The custom roles widget at the top of the screen lists the custom roles defined in the system in a table. Each row in the table contains the following information for a single role:

Column
Description
NameThe role's name. 
Clicking on a role's name will load the role's details in the Role View and provide access to system actions for the role. 
DescriptionThe description for this role

...

The Role Details section below provides information about the details required for adding or editing custom roles.

Built-In Roles Table

The built-in roles widget at the top of the screen lists the built-in roles defined in the system in a table. Each row in the table contains the following information for a single role:

Column
Description
NameThe role's name. 
Clicking on a role's name will load the role's details in the Role View and provide access to system actions for the role. 
DescriptionThe description for this role

...

DetailContent Description
NameThe name of this role
DescriptionThe description of this role.
Allowed Devices
(For custom roles only
A comma-separated list of devices this role provides access to or N/A when the role is not used to allow device access.
Denied Devices
(For custom roles only) 
A comma-separated list of devices this role denies access to or N/A when the role is not used to deny device access. 
Allowed Domains
(For custom roles only) 
A comma-separated list of domains this role provides access to or N/A when the role is not used to allow domain access. 
Denied Domains
(For custom roles only) 
A comma-separated list of domains this role denies access to or N/A when the role is not used to deny domain access. 
Allowed Services
(For custom roles only) 
A comma-separated list of services this role provides access to or N/A when the role is not used to allow service access. 
Denied Services
(For custom roles only) 
A comma-separated list of services this role denies access to or N/A when the role is not used to deny service access. 
Allowed Client IPs
(For custom roles only) 

A comma-separated list of client IP addresses this role provides access to or N/A when the role is not used to allow client IP access.

Denied Client IPs
(For custom roles only) 
A comma-separated list of client IP addresses this role denies access to or N/A when the role is not used to deny client IP access. 
Allow Raw Messages
(For custom roles only) 
Whether this role, when assigned to a user, allows them to view Raw Messages.
Allow Payload
(For custom roles only) 
Whether this role, when assigned to a user, allows them to view Messages Payload.

Manage Payload Capture
(For custom roles only)

Whether this role, when assigned to a user, allows them to manage payload capture.
Groups in RoleThis widget lists all the the Security Groups assigned  assigned this role.
You may use the controls in this widget to remove or add a group association to this role.
Users in RoleThis widget lists all the Users assigned this role.
You may use the controls in this widget to remove or add a user association to this role.

...

FieldPurpose
NameThe name of this role. This is a mandatory field.
DescriptionThe description of this role.
Allowed Devices
 
A comma-separated list of devices this role provides access to.
Leave empty if the role is not used to allow device accessSee possible field values below.
Denied DevicesA comma-separated list of devices this role denies access to.
Leave empty if the role is not used to deny device access.  See possible field values below.
Allowed DomainsA comma-separated list of domains this role provides access to.
Leave empty if the role is not used to allow domain access.  See possible field values below.
Denied DomainsA comma-separated list of domains this role denies access to.
Leave empty if the role is not used to deny domain access See possible field values below. 
Allowed ServicesA comma-separated list of services this role provides access to.
Leave empty if the role is not used to allow service access See possible field values below. 
Denied ServicesA comma-separated list of services this role denies access to.
Leave empty if the role is not used to deny service access See possible field values below. 
Allowed Client IPs

A comma-separated list of client IP addresses this role provides access to.
Leave empty if the role is not used to allow client IP access See possible field values below.

Denied Client IPsA comma-separated list of client IP addresses this role denies access to.
Leave empty if the role is not used to deny client IP access.  See possible field values below.
Allow Access to Raw MessagesWhether this role, when assigned to a user, allows them to view Raw Messages.
Allow Access to PayloadWhether this role, when assigned to a user, allows them to view Messages Payload.
Allow Manage Payload CaptureWhether this role, when assigned to a user, allows them to manage payload capture.

Possible

...

Field Values

Each field that provides access or denies access to devices, domains, services or client IP addresses should contain the values described below:

  • The field contains a comma-separated list of values to allow or deny.
  • Wildcards are not allowed.
  • When left blank, the field does not affect access.