Configure admin roles

Prev Next

Review the Before you start section for links to system security best practices. When you're ready, use +Add to set up a new Admin Role. You can use a template for the preset roles or create your own role by selecting Generic.

NOTE

An admin user cannot create a role that has more privileges than they currently have. The roles they can create can have only a subset of their current privileges.

Menu displaying various templates for creating admin roles.

Preset templates provide an easy way to configure access to pages such as the Dashboard, which work differently from other single function pages as they can contain Target Items. Unless the right privileges are configured, the admin will have only partial access to the information. In the case of the Dashboard the preset template provides the following privileges:

  • <View> privileges on <AdminMessage>

  • <CheckStatus> privileges on <Appliance>

  • <View> privileges on <SessionInfo>

  • <View> privileges on <TokenRecord> (for user-sign-ins)

  • <View> privileges on <RegisteredDevice>

  • <View> privileges on <User License>

Add Admin Role

To add an admin role, select +Add and complete the following fields:

  • Name. May only be alphanumeric with space, underscore, and dash.

  • Privileges. Privileges allow specific rights to be assigned to an Admin Role. Multiple Privileges may be added to one Role. i.e. view/edit/delete Policies tagged with CustomerA.

Note that Admin Roles default to <All> Privilege Types on <All> Target Items, so the role will permit full system admin privileges to all entities on the system. Change these settings when delegating administration to control permitted access and actions with the same level of granularity that is applied to control user access to network resources.

Privileges can be configured to enable <All> or a particular Privilege Type to be applied to a type of Target (such as Appliances or Entitlements) or to a specific Target (such as a named Appliance or Entitlements tagged with <admin1-tag>).

To add a new Privilege to an Admin Role, select +Add to open the Privileges settings:

Edit privileges for identity provider settings, including name and tag options.

  • Privilege Type. Select the Type of action the administrator can perform, such as Delete or Export. The default Privilege is <All> for all possible actions, which can be applied to all Target Items.

  • Target Item. Select the feature on which the action can be applied, such as Condition or License. The list of Target Items in the drop down list will depend on which Privilege type has been selected. See the Privilege-Target Combinations table below. Target Items can be further restricted by adding optional Limit Scope of Privilege settings to the role.

  • Limit Scope of Privilege by Name. Restrict the Target further to features with the specified names.

  • Limit Scope of Privilege by Tag. Restrict the Target further to features with the specified tags. In the example above, an Admin Role is being created to allow an Administrator to Edit the Local database. In the example below, the Privilege will be restricted to Policies tagged “mobile”.

Settings for privileges including view type and mobile policy tag options.

  • Default tags. These tags will be added by default when creating a new instance of the specified target. To change these requires Edit rights on the Target.

Privilege-Target Combinations

Privilege Type

Target Item

All

Assign Function

Backup

Check Status

Create

Delete

Download Logs

Edit

Export

Get User Attributes

Reboot

Renew Certificate

Reevaluate

Revoke

Tag

Test

Upgrade

View

Admin Role

yes

yes

yes

yes

yes

yes

Admin Message

yes

yes

yes

yes

Allocated IP

yes

yes

Appliance

yes

yes

yes

yes

yes

yes

yes

yes (excludes assign function)

yes

yes

yes

yes

yes (for appliance commands)

yes

yes

Appliance Customization

yes

yes

yes

yes

yes

yes

Audit Log

yes

yes

Auto Update

yes

yes

yes

Denylist

yes

yes

yes

yes

CA Certificate

yes

yes

yes

yes

yes

Client Profile

yes

yes

yes

yes

yes

yes

yes

Condition

yes

yes

yes

yes

yes

yes

yes

Criteria Script

yes

yes

yes

yes

yes

yes

yes

Device Claims Script

yes

yes

yes

yes

yes

yes

Discovered App

yes

yes

yes

Entitlement

yes

yes

yes

yes

yes

yes

Entitlement Script

yes

yes

yes

yes

yes

yes

FIDO2 Device

yes

yes

yes

File

yes

yes

yes

yes

Global Setting

yes

yes

yes

yes

Identity Provider

yes

yes

yes

yes

yes

yes

yes

yes

IP Pool

yes

yes

yes

yes

yes

yes

License

yes

yes

yes

yes

Local User

yes

yes

yes

yes

yes

yes

MFA Provider

yes

yes

yes

yes

yes

yes

yes

OTP Seed

yes

yes

yes

Policy

yes

yes

yes

yes

yes

yes

Registered Device

yes

yes

yes

yes

yes

Ringfence Rule

yes

yes

yes

yes

yes

yes

Secret

yes

yes

yes

yes

yes

yes

Service User

yes

yes

yes

yes

yes

yes

Session Info

yes

yes

Site

yes

yes

yes

yes

yes

yes

Token Record (Deprecated)

yes

yes

yes

yes

Trusted Certificate

yes

yes

yes

yes

yes

User Claim Script

yes

yes

yes

yes

yes

yes

User License

yes

yes

yes

ZTP

yes

yes

yes

yes

yes