SlideShare uma empresa Scribd logo
1 de 15
Role-Based Administration
                                                              Matthew Hudson, MVP




© 2012 SolarWinds Worldwide, LLC. All Rights Reserved.
                                                         1
Today’s Presentation

» Hosts
   Lawrence Garvin, Product Manager, SolarWinds
   Matthew Hudson, MVP
» Producer: Catherine Jackson
» The bulk of this presentation is live demo.
» Ask questions!
   Don’t wait until the end, ask away – use chat feature.
» Today’s session is being recorded.
   Recorded session on SolarWinds.com
   Slides available on slideshare.net

                            2
Which is it?



               Role-Based Administration (RBA)
                              or
               Role Based Access Control (RBAC)




                              3
Role Based Access Control
»    Manage
      Security roles (Class)
      Security scopes (Instance)
      Collections
»    Full Administrator: This security role grants all permissions in Configuration Manager.
»    Asset Analyst: This security role allows administrative users to view data collected by using Asset
     Intelligence, software inventory, hardware inventory, and software metering. Administrative users
     can create metering rules and Asset Intelligence categories, families, and labels.
»    Software Update Manager: This security role grants permissions to define and deploy software
     updates. Administrative users who are associated with this role can create collections, software
     update groups, deployments, templates, and enable software updates for Network Access
     Protection (NAP).
»    Read-Only Analyst: Grants permissions to view all Configuration Manager objects.
»    Application Author: Grants permissions to create, modify, and retire applications. Administrative
     users who are associated with this role can also manage applications, packages.
»    Application Administrator: Grants permissions to perform both the Application Deployment
     Manager role and the Application Author role. Administrative users who are associated with this
     role can also manage queries, view site settings, manage collections, and edit settings for user
     device affinity

                                                   4
Role Based Access Control

»   Application Administrator
»   Application Author
»   Application Deployment Manager
»   Asset manager
»   Compliance Settings Manager
»   Full Administrator
»   Infrastructure Administrator
»   Operating system Deployment Manager
»   Operations Administrator
»   Read-only Analyst
»   Remote Tools Operator
»   Security Administrator
»   Software Update Manager

                               5
Role Access




              6
John       Security Admin



            Special Access



           Resource Access




       7
Administrator       Read only Analyst w/ Collection Scope




                8
Security Scopes

» Assets and Compliance
    Software Metering
» Software Library
    Deployment Packages
» Administration
    Site Configurations
       • Sites
       • Client Settings
    Distribution Points
    Distribution Point Groups




                                 9
Scopes

Security > Administrative user > Properties
    Security Scopes




                                10
Set a Security Scope




                       11
Process

» Security Scopes – Create Security Scope
» Set scopes – Client Settings / Set Security Scope
      Create account
      Add Account to Configuration Manager
      Select User
      Select the Role for the use
      Select Security Scopes / Create
» Add the Security Scope if necessary / Edit




                                   12
Planning

» Collections:
    Functional Organization, Geographic Alignment, Security
     Requirements, Organization Alignment
» Security Scopes
    All, Default
» Types for Scopes
    Applications, Packages, Boot images, Sites, Custom Client settings, DP,
     DP Groups, Software update groups
» No Security Scopes
    Administrative Users, Security Roles, Default Client settings,
     Boundaries, Site Addresses, Site system roles




                                     13
Demo




       Role Based Administration in
       Configuration Manager 2012




                        14
Resources

   »      Introducing Role-Based Administration in System Center 2012
          Configuration Manager
           http://blogs.technet.com/b/configmgrteam/archive/2011/09/23/introduci
            ng-role-based-administration-in-system-center-2012-configuration-
            manager.aspx
   »      Role-Based Administration in System Center 2012 Configuration
          Manager
           http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based-
            administration-in-system-center-2012-configuration-manager.aspx
   »      What’s new:
           http://technet.microsoft.com/en-us/library/gg699359.aspx
   »      Security and Compliance:
           http://technet.microsoft.com/en-us/library/gg682033.aspx
   »      Patch Management Tips & Best Practices:
           PatchZone.org



© 2012 SolarWinds Worldwide, LLC. All Rights Reserved.
                                                         15

Mais conteúdo relacionado

Mais de SolarWinds

Mais de SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Role-Based Administration

  • 1. Role-Based Administration Matthew Hudson, MVP © 2012 SolarWinds Worldwide, LLC. All Rights Reserved. 1
  • 2. Today’s Presentation » Hosts  Lawrence Garvin, Product Manager, SolarWinds  Matthew Hudson, MVP » Producer: Catherine Jackson » The bulk of this presentation is live demo. » Ask questions!  Don’t wait until the end, ask away – use chat feature. » Today’s session is being recorded.  Recorded session on SolarWinds.com  Slides available on slideshare.net 2
  • 3. Which is it? Role-Based Administration (RBA) or Role Based Access Control (RBAC) 3
  • 4. Role Based Access Control » Manage  Security roles (Class)  Security scopes (Instance)  Collections » Full Administrator: This security role grants all permissions in Configuration Manager. » Asset Analyst: This security role allows administrative users to view data collected by using Asset Intelligence, software inventory, hardware inventory, and software metering. Administrative users can create metering rules and Asset Intelligence categories, families, and labels. » Software Update Manager: This security role grants permissions to define and deploy software updates. Administrative users who are associated with this role can create collections, software update groups, deployments, templates, and enable software updates for Network Access Protection (NAP). » Read-Only Analyst: Grants permissions to view all Configuration Manager objects. » Application Author: Grants permissions to create, modify, and retire applications. Administrative users who are associated with this role can also manage applications, packages. » Application Administrator: Grants permissions to perform both the Application Deployment Manager role and the Application Author role. Administrative users who are associated with this role can also manage queries, view site settings, manage collections, and edit settings for user device affinity 4
  • 5. Role Based Access Control » Application Administrator » Application Author » Application Deployment Manager » Asset manager » Compliance Settings Manager » Full Administrator » Infrastructure Administrator » Operating system Deployment Manager » Operations Administrator » Read-only Analyst » Remote Tools Operator » Security Administrator » Software Update Manager 5
  • 7. John Security Admin Special Access Resource Access 7
  • 8. Administrator Read only Analyst w/ Collection Scope 8
  • 9. Security Scopes » Assets and Compliance  Software Metering » Software Library  Deployment Packages » Administration  Site Configurations • Sites • Client Settings  Distribution Points  Distribution Point Groups 9
  • 10. Scopes Security > Administrative user > Properties  Security Scopes 10
  • 11. Set a Security Scope 11
  • 12. Process » Security Scopes – Create Security Scope » Set scopes – Client Settings / Set Security Scope  Create account  Add Account to Configuration Manager  Select User  Select the Role for the use  Select Security Scopes / Create » Add the Security Scope if necessary / Edit 12
  • 13. Planning » Collections:  Functional Organization, Geographic Alignment, Security Requirements, Organization Alignment » Security Scopes  All, Default » Types for Scopes  Applications, Packages, Boot images, Sites, Custom Client settings, DP, DP Groups, Software update groups » No Security Scopes  Administrative Users, Security Roles, Default Client settings, Boundaries, Site Addresses, Site system roles 13
  • 14. Demo Role Based Administration in Configuration Manager 2012 14
  • 15. Resources » Introducing Role-Based Administration in System Center 2012 Configuration Manager  http://blogs.technet.com/b/configmgrteam/archive/2011/09/23/introduci ng-role-based-administration-in-system-center-2012-configuration- manager.aspx » Role-Based Administration in System Center 2012 Configuration Manager  http://blogs.technet.com/b/hhoy/archive/2012/03/07/role-based- administration-in-system-center-2012-configuration-manager.aspx » What’s new:  http://technet.microsoft.com/en-us/library/gg699359.aspx » Security and Compliance:  http://technet.microsoft.com/en-us/library/gg682033.aspx » Patch Management Tips & Best Practices:  PatchZone.org © 2012 SolarWinds Worldwide, LLC. All Rights Reserved. 15