SlideShare uma empresa Scribd logo
1 de 24
Role / User Management in
IT360 Enterprise Edition and
Professional Edition

           K.Lakshmi Shankar
What you learn from this presentation?
 After going through this presentation, you will know:
 2.What is Role Management
 3.Default Roles supported in IT360
 4.What is User Management
 5.Default Users supported in IT360
 6.The relationship between User Management and Role Management – the Role vs
 User matrix
 7.The Role vs IT360 Module matrix
 8.How to create a New User from the default available Roles
 9.How to create a New Role itself and associate the same to a User
 Note 1: This presentation is designed to help you understand User and Role Management as defined in IT360
 and hence does not cover the detailed steps on creating a custom User or a custom Role. However, relevant
 links to our online documents are provided for the same. On a similar note AD User import , etc., are not
 covered here.
 Note 2: The screenshots in this presentation are for representation only. The content / fields would be slightly
 different depending on the edition you use – Professional Edition or Enterprise Edition Central Server or
 Enterprise Edition Probe.




                                              ZOHO Corporation Confidential
Definitions
 • Role Management is an authorization
   mechanism that defines which Users access
   which modules of IT360
 • User Management is an authentication
   mechanism that controls the access to IT360
   application to individuals of the IT Department
   / Organization




                    ZOHO Corporation Confidential
Introduction to Role Management
• There are 11 Roles defined in IT360
• Some Roles provide full administrative
  capabilities; some provide Read-Only capabilities
  while some provide intermediate access
• You can define your own New Role also
• Users acquire access rights through their Roles
• A User has to be associated to a defined Role
• You can associate a Role to many Users [one to
  many]


                    ZOHO Corporation Confidential
11 Predefined Roles in IT360




              ZOHO Corporation Confidential
Introduction to User Management

•Users are an integral part of IT360
•Users acquire access rights through their Roles
•A User has to be associated to a defined Role
•Some of them need a full Administrator access while a few need
only a Read Only access
•Some of them will require an intermediate access - an
administrator access to a certain limited modules of IT360 and a
Read Only access to the rest of the modules
•There are 8 User supported in IT360 by default
•You can define your own New User
•You can associate many Users to a Role [many to one]




                         ZOHO Corporation Confidential
8 Predefined User in IT360




              ZOHO Corporation Confidential
The “Role – User” matrix in IT360
                  Role                                             User
           Administrator Role                                      admin
               Guest Role                                          guest
         Network Administrator                                   nwadmin
            Network Operator                                    nwoperator
  System and Applications Administrator                          sysadmin
            System Operator                                     sysoperator
            IT Administrator                                      itadmin
              Operator Role                                     operatoruser
          HelpDesk Technician                                        --
           HelpDesk Requestor                                        --
     HelpDesk Non Login Technician                                   --

                                ZOHO Corporation Confidential
“Role - Module Access” matrix
      Role: Administrator Role                               User: admin
        IT360 module        Read Write Access              Read Only Access
          Networks                     Yes                       NA
          Servers &                    Yes                       NA
         Applications
            Traffic                    Yes                       NA
         ServiceDesk                   Yes                       NA
        Role: Guest Role                                       User: guest
        IT360 module        Read Write Access              Read Only Access
          Networks                     No                        Yes
          Servers &                    No                        Yes
         Applications
            Traffic                    No                        Yes
         ServiceDesk         Yes [“Requester”                    NA
                                  access]

                           ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: Network Administrator                                User: nwadmin
           IT360 module            Read Write Access             Read Only Access
             Networks                        Yes                       NA
        Servers & Applications               No                        No
               Traffic                       Yes                       NA
            ServiceDesk             Yes [“Technician”                  NA
                                         access]
        Role: Network Operator                                   User: nwoperator
           IT360 module            Read Write Access             Read Only Access
             Networks                        No                        Yes
        Servers & Applications               No                        No
               Traffic                       No                   Yes [assigned
                                                                  Groups only]
            ServiceDesk             Yes [“Technician”                  NA
                                         access]



                                 ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: System Administrator                           User: sysadmin
          IT360 module      Read Write Access              Read Only Access
            Networks                   No                        No
            Servers &                  Yes                       NA
           Applications
              Traffic                  No                        No
           ServiceDesk       Yes [“Technician”                   NA
                                  access]
        Role: System Operator                              User: sysoperator
          IT360 module      Read Write Access              Read Only Access
            Networks                   No                        Yes
            Servers &                  No                   Yes [assigned
           Applications                                       Groups]
              Traffic                  No                        No
           ServiceDesk       Yes [“Technician”                   NA
                                  access]

                           ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: IT Administrator                                         User: itadmin
           IT360 module           Read Write Access                Read Only Access
              Networks                       Yes                           NA
        Servers & Applications               Yes                           NA
               Traffic                       Yes                           NA
            ServiceDesk            Yes [“Technician +                     NA
                                      Reporter +
                                  POApprover + Change
                                    Manager” access]
         Role: Operator User                                     User: operator user
            IT360 module            Read Write Access              Read Only Access
              Networks                       No                           Yes
        Servers & Applications               No                   Yes [assigned Groups]
               Traffic                       No                   Yes [assigned Groups]
             ServiceDesk             Yes [“Requester”                      NA
                                          access]


                                 ZOHO Corporation Confidential
“Access Rights – User” matrix




              ZOHO Corporation Confidential
A question




             ZOHO Corporation Confidential
Creating a New Role

•Go to Admin – General – Role Management – click on Add Role
•Fill in the details requested in order. Select the appropriate
radio button – the “Yes” Radio button if you want Read-Write
access to the General modules of IT360 like Configuring Mail
Server setting, Proxy server settings, SMS Server settings, etc.
•Next, you see check boxes – one each for every module
•The Servers & Applications module will have to be checked
mandatorily with a “Client” Role at the least – this module is the
base module
•Next, select / check the other appropriate modules




                          ZOHO Corporation Confidential
Creating a New Role - screenshot




                 ZOHO Corporation Confidential
Creating a New Role – contd.

•Click Next and choose the access privileges for
each of the selected / checked modules…
•Click save
•Done! You have created a new Role with a
chosen set of access privileges. You can now
create a New User and associate this Role to the
New User!


                   ZOHO Corporation Confidential
One more question




             ZOHO Corporation Confidential
Creating a New User

•Go to Admin tab – General – click on User
Management – Add User button
•A pop up window opens up as shown in the
next slide…
•Fill in the fields in order and Save!!
•Done!



                  ZOHO Corporation Confidential
Creating a New User - screenshot




                   ZOHO Corporation Confidential
Recollecting…

Remember!

•User Management is dependent on the
underlying Role Management

•You can define your own Users and Roles and
associate them!!

                  ZOHO Corporation Confidential
Have you understood?
I hope you would have understood User
Management, Role Management and the
relationship between them as defined in IT360
Enterprise Edition and Professional Edition

Also, you now know the default User types and
Roles as supported in IT360

Creating custom User types and Roles


                  ZOHO Corporation Confidential
References
For more details, you may refer to our online help
documentation

http://www.manageengine.com/it360/help/meitms/getting-st

http
://www.manageengine.com/it360/help/meitms/manage-user

http://
www.manageengine.com/it360/help/meitms/manage-users-r




                       ZOHO Corporation Confidential
Contact Us
Write to us for any help:

It360-eval@manageengine.com

                   Thank You




                    ZOHO Corporation Confidential

Mais conteúdo relacionado

Mais procurados

It security-plan-template
It security-plan-templateIt security-plan-template
It security-plan-templatejbmills1634
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of SigmaFlorian Roth
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to TenableBharat Jindal
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Blue Teamer
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3WE-IT TUTORIALS
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 

Mais procurados (20)

It security-plan-template
It security-plan-templateIt security-plan-template
It security-plan-template
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
50 Shades of Sigma
50 Shades of Sigma50 Shades of Sigma
50 Shades of Sigma
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to Tenable
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Spyware
SpywareSpyware
Spyware
 
Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)Deploying Privileged Access Workstations (PAWs)
Deploying Privileged Access Workstations (PAWs)
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 

Destaque

User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privilegesYogiji Creations
 
User management through administration process 2307
User management through administration process 2307User management through administration process 2307
User management through administration process 2307Hansraj Mali
 
User Management SaaS
User Management SaaSUser Management SaaS
User Management SaaSEmmanuel Ide
 
An Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAn Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAtlassian
 
Oracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryOracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryChien Chung Shen
 
Asp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptAsp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptShivanand Arur
 
Oracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptOracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptChien Chung Shen
 
Oracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewOracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewEslam Hafez
 
Commonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizCommonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizJonna Cadores
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql databasegourav kottawar
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureAtul Goyal
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recoveryAnne Lee
 
Présentation Oracle DataBase 11g
Présentation Oracle DataBase 11gPrésentation Oracle DataBase 11g
Présentation Oracle DataBase 11gCynapsys It Hotspot
 
The Role of Management at Possible
The Role of Management at PossibleThe Role of Management at Possible
The Role of Management at PossiblePossible
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oraclesadegh salehi
 

Destaque (20)

User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
 
User management through administration process 2307
User management through administration process 2307User management through administration process 2307
User management through administration process 2307
 
User management in joomla
User management in joomlaUser management in joomla
User management in joomla
 
User Management SaaS
User Management SaaSUser Management SaaS
User Management SaaS
 
Oracle Web Center Overview
Oracle Web Center OverviewOracle Web Center Overview
Oracle Web Center Overview
 
An Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAn Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and Confluence
 
Oracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryOracle Database Management - Backup/Recovery
Oracle Database Management - Backup/Recovery
 
MySQL 8.0 : Roles
MySQL 8.0 : RolesMySQL 8.0 : Roles
MySQL 8.0 : Roles
 
Asp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptAsp.net membership anduserroles_ppt
Asp.net membership anduserroles_ppt
 
Oracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptOracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation Concept
 
Oracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewOracle Webcenter Suite Overview
Oracle Webcenter Suite Overview
 
Les01
Les01Les01
Les01
 
Commonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizCommonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling Quiz
 
Oracle 11g concept
Oracle 11g conceptOracle 11g concept
Oracle 11g concept
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
 
Présentation Oracle DataBase 11g
Présentation Oracle DataBase 11gPrésentation Oracle DataBase 11g
Présentation Oracle DataBase 11g
 
The Role of Management at Possible
The Role of Management at PossibleThe Role of Management at Possible
The Role of Management at Possible
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oracle
 

Semelhante a Role and User Management in IT360

Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIBeyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIStuart McIntyre
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Securitydkaya
 
Turn your SOA up to 11
Turn your SOA up to 11Turn your SOA up to 11
Turn your SOA up to 11Jim Siegienski
 
WAS Support & Monitoring Tools
WAS Support & Monitoring ToolsWAS Support & Monitoring Tools
WAS Support & Monitoring ToolsRoyal Cyber Inc.
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld
 
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Sverige
 
MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012alipaiva
 
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora
 
Reactive Micro Services with Java seminar
Reactive Micro Services with Java seminarReactive Micro Services with Java seminar
Reactive Micro Services with Java seminarGal Marder
 
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...Novell
 
IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)dmoranj
 
WS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleWS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleCloudOps Summit
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajdamvajda62
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Banking at Ho Chi Minh city
 
Introduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersIntroduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersSaltmarch Media
 

Semelhante a Role and User Management in IT360 (20)

Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIBeyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Security
 
Turn your SOA up to 11
Turn your SOA up to 11Turn your SOA up to 11
Turn your SOA up to 11
 
WAS Support & Monitoring Tools
WAS Support & Monitoring ToolsWAS Support & Monitoring Tools
WAS Support & Monitoring Tools
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
 
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
 
MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Mobile App Development 101
Mobile App Development 101Mobile App Development 101
Mobile App Development 101
 
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
 
Reactive Micro Services with Java seminar
Reactive Micro Services with Java seminarReactive Micro Services with Java seminar
Reactive Micro Services with Java seminar
 
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
 
IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)
 
Explore Android Internals
Explore Android InternalsExplore Android Internals
Explore Android Internals
 
WS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleWS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops style
 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
 
Enterprise Enabler- Presentation
Enterprise Enabler- PresentationEnterprise Enabler- Presentation
Enterprise Enabler- Presentation
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajda
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
 
Introduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersIntroduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 Developers
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Role and User Management in IT360

  • 1. Role / User Management in IT360 Enterprise Edition and Professional Edition K.Lakshmi Shankar
  • 2. What you learn from this presentation? After going through this presentation, you will know: 2.What is Role Management 3.Default Roles supported in IT360 4.What is User Management 5.Default Users supported in IT360 6.The relationship between User Management and Role Management – the Role vs User matrix 7.The Role vs IT360 Module matrix 8.How to create a New User from the default available Roles 9.How to create a New Role itself and associate the same to a User Note 1: This presentation is designed to help you understand User and Role Management as defined in IT360 and hence does not cover the detailed steps on creating a custom User or a custom Role. However, relevant links to our online documents are provided for the same. On a similar note AD User import , etc., are not covered here. Note 2: The screenshots in this presentation are for representation only. The content / fields would be slightly different depending on the edition you use – Professional Edition or Enterprise Edition Central Server or Enterprise Edition Probe. ZOHO Corporation Confidential
  • 3. Definitions • Role Management is an authorization mechanism that defines which Users access which modules of IT360 • User Management is an authentication mechanism that controls the access to IT360 application to individuals of the IT Department / Organization ZOHO Corporation Confidential
  • 4. Introduction to Role Management • There are 11 Roles defined in IT360 • Some Roles provide full administrative capabilities; some provide Read-Only capabilities while some provide intermediate access • You can define your own New Role also • Users acquire access rights through their Roles • A User has to be associated to a defined Role • You can associate a Role to many Users [one to many] ZOHO Corporation Confidential
  • 5. 11 Predefined Roles in IT360 ZOHO Corporation Confidential
  • 6. Introduction to User Management •Users are an integral part of IT360 •Users acquire access rights through their Roles •A User has to be associated to a defined Role •Some of them need a full Administrator access while a few need only a Read Only access •Some of them will require an intermediate access - an administrator access to a certain limited modules of IT360 and a Read Only access to the rest of the modules •There are 8 User supported in IT360 by default •You can define your own New User •You can associate many Users to a Role [many to one] ZOHO Corporation Confidential
  • 7. 8 Predefined User in IT360 ZOHO Corporation Confidential
  • 8. The “Role – User” matrix in IT360 Role User Administrator Role admin Guest Role guest Network Administrator nwadmin Network Operator nwoperator System and Applications Administrator sysadmin System Operator sysoperator IT Administrator itadmin Operator Role operatoruser HelpDesk Technician -- HelpDesk Requestor -- HelpDesk Non Login Technician -- ZOHO Corporation Confidential
  • 9. “Role - Module Access” matrix Role: Administrator Role User: admin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Yes NA Applications Traffic Yes NA ServiceDesk Yes NA Role: Guest Role User: guest IT360 module Read Write Access Read Only Access Networks No Yes Servers & No Yes Applications Traffic No Yes ServiceDesk Yes [“Requester” NA access] ZOHO Corporation Confidential
  • 10. “Role - Module Access” matrix– contd. Role: Network Administrator User: nwadmin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Applications No No Traffic Yes NA ServiceDesk Yes [“Technician” NA access] Role: Network Operator User: nwoperator IT360 module Read Write Access Read Only Access Networks No Yes Servers & Applications No No Traffic No Yes [assigned Groups only] ServiceDesk Yes [“Technician” NA access] ZOHO Corporation Confidential
  • 11. “Role - Module Access” matrix– contd. Role: System Administrator User: sysadmin IT360 module Read Write Access Read Only Access Networks No No Servers & Yes NA Applications Traffic No No ServiceDesk Yes [“Technician” NA access] Role: System Operator User: sysoperator IT360 module Read Write Access Read Only Access Networks No Yes Servers & No Yes [assigned Applications Groups] Traffic No No ServiceDesk Yes [“Technician” NA access] ZOHO Corporation Confidential
  • 12. “Role - Module Access” matrix– contd. Role: IT Administrator User: itadmin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Applications Yes NA Traffic Yes NA ServiceDesk Yes [“Technician + NA Reporter + POApprover + Change Manager” access] Role: Operator User User: operator user IT360 module Read Write Access Read Only Access Networks No Yes Servers & Applications No Yes [assigned Groups] Traffic No Yes [assigned Groups] ServiceDesk Yes [“Requester” NA access] ZOHO Corporation Confidential
  • 13. “Access Rights – User” matrix ZOHO Corporation Confidential
  • 14. A question ZOHO Corporation Confidential
  • 15. Creating a New Role •Go to Admin – General – Role Management – click on Add Role •Fill in the details requested in order. Select the appropriate radio button – the “Yes” Radio button if you want Read-Write access to the General modules of IT360 like Configuring Mail Server setting, Proxy server settings, SMS Server settings, etc. •Next, you see check boxes – one each for every module •The Servers & Applications module will have to be checked mandatorily with a “Client” Role at the least – this module is the base module •Next, select / check the other appropriate modules ZOHO Corporation Confidential
  • 16. Creating a New Role - screenshot ZOHO Corporation Confidential
  • 17. Creating a New Role – contd. •Click Next and choose the access privileges for each of the selected / checked modules… •Click save •Done! You have created a new Role with a chosen set of access privileges. You can now create a New User and associate this Role to the New User! ZOHO Corporation Confidential
  • 18. One more question ZOHO Corporation Confidential
  • 19. Creating a New User •Go to Admin tab – General – click on User Management – Add User button •A pop up window opens up as shown in the next slide… •Fill in the fields in order and Save!! •Done! ZOHO Corporation Confidential
  • 20. Creating a New User - screenshot ZOHO Corporation Confidential
  • 21. Recollecting… Remember! •User Management is dependent on the underlying Role Management •You can define your own Users and Roles and associate them!! ZOHO Corporation Confidential
  • 22. Have you understood? I hope you would have understood User Management, Role Management and the relationship between them as defined in IT360 Enterprise Edition and Professional Edition Also, you now know the default User types and Roles as supported in IT360 Creating custom User types and Roles ZOHO Corporation Confidential
  • 23. References For more details, you may refer to our online help documentation http://www.manageengine.com/it360/help/meitms/getting-st http ://www.manageengine.com/it360/help/meitms/manage-user http:// www.manageengine.com/it360/help/meitms/manage-users-r ZOHO Corporation Confidential
  • 24. Contact Us Write to us for any help: It360-eval@manageengine.com Thank You ZOHO Corporation Confidential