SlideShare uma empresa Scribd logo
1 de 24
Role / User Management in
IT360 Enterprise Edition and
Professional Edition

           K.Lakshmi Shankar
What you learn from this presentation?
 After going through this presentation, you will know:
 2.What is Role Management
 3.Default Roles supported in IT360
 4.What is User Management
 5.Default Users supported in IT360
 6.The relationship between User Management and Role Management – the Role vs
 User matrix
 7.The Role vs IT360 Module matrix
 8.How to create a New User from the default available Roles
 9.How to create a New Role itself and associate the same to a User
 Note 1: This presentation is designed to help you understand User and Role Management as defined in IT360
 and hence does not cover the detailed steps on creating a custom User or a custom Role. However, relevant
 links to our online documents are provided for the same. On a similar note AD User import , etc., are not
 covered here.
 Note 2: The screenshots in this presentation are for representation only. The content / fields would be slightly
 different depending on the edition you use – Professional Edition or Enterprise Edition Central Server or
 Enterprise Edition Probe.




                                              ZOHO Corporation Confidential
Definitions
 • Role Management is an authorization
   mechanism that defines which Users access
   which modules of IT360
 • User Management is an authentication
   mechanism that controls the access to IT360
   application to individuals of the IT Department
   / Organization




                    ZOHO Corporation Confidential
Introduction to Role Management
• There are 11 Roles defined in IT360
• Some Roles provide full administrative
  capabilities; some provide Read-Only capabilities
  while some provide intermediate access
• You can define your own New Role also
• Users acquire access rights through their Roles
• A User has to be associated to a defined Role
• You can associate a Role to many Users [one to
  many]


                    ZOHO Corporation Confidential
11 Predefined Roles in IT360




              ZOHO Corporation Confidential
Introduction to User Management

•Users are an integral part of IT360
•Users acquire access rights through their Roles
•A User has to be associated to a defined Role
•Some of them need a full Administrator access while a few need
only a Read Only access
•Some of them will require an intermediate access - an
administrator access to a certain limited modules of IT360 and a
Read Only access to the rest of the modules
•There are 8 User supported in IT360 by default
•You can define your own New User
•You can associate many Users to a Role [many to one]




                         ZOHO Corporation Confidential
8 Predefined User in IT360




              ZOHO Corporation Confidential
The “Role – User” matrix in IT360
                  Role                                             User
           Administrator Role                                      admin
               Guest Role                                          guest
         Network Administrator                                   nwadmin
            Network Operator                                    nwoperator
  System and Applications Administrator                          sysadmin
            System Operator                                     sysoperator
            IT Administrator                                      itadmin
              Operator Role                                     operatoruser
          HelpDesk Technician                                        --
           HelpDesk Requestor                                        --
     HelpDesk Non Login Technician                                   --

                                ZOHO Corporation Confidential
“Role - Module Access” matrix
      Role: Administrator Role                               User: admin
        IT360 module        Read Write Access              Read Only Access
          Networks                     Yes                       NA
          Servers &                    Yes                       NA
         Applications
            Traffic                    Yes                       NA
         ServiceDesk                   Yes                       NA
        Role: Guest Role                                       User: guest
        IT360 module        Read Write Access              Read Only Access
          Networks                     No                        Yes
          Servers &                    No                        Yes
         Applications
            Traffic                    No                        Yes
         ServiceDesk         Yes [“Requester”                    NA
                                  access]

                           ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: Network Administrator                                User: nwadmin
           IT360 module            Read Write Access             Read Only Access
             Networks                        Yes                       NA
        Servers & Applications               No                        No
               Traffic                       Yes                       NA
            ServiceDesk             Yes [“Technician”                  NA
                                         access]
        Role: Network Operator                                   User: nwoperator
           IT360 module            Read Write Access             Read Only Access
             Networks                        No                        Yes
        Servers & Applications               No                        No
               Traffic                       No                   Yes [assigned
                                                                  Groups only]
            ServiceDesk             Yes [“Technician”                  NA
                                         access]



                                 ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: System Administrator                           User: sysadmin
          IT360 module      Read Write Access              Read Only Access
            Networks                   No                        No
            Servers &                  Yes                       NA
           Applications
              Traffic                  No                        No
           ServiceDesk       Yes [“Technician”                   NA
                                  access]
        Role: System Operator                              User: sysoperator
          IT360 module      Read Write Access              Read Only Access
            Networks                   No                        Yes
            Servers &                  No                   Yes [assigned
           Applications                                       Groups]
              Traffic                  No                        No
           ServiceDesk       Yes [“Technician”                   NA
                                  access]

                           ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: IT Administrator                                         User: itadmin
           IT360 module           Read Write Access                Read Only Access
              Networks                       Yes                           NA
        Servers & Applications               Yes                           NA
               Traffic                       Yes                           NA
            ServiceDesk            Yes [“Technician +                     NA
                                      Reporter +
                                  POApprover + Change
                                    Manager” access]
         Role: Operator User                                     User: operator user
            IT360 module            Read Write Access              Read Only Access
              Networks                       No                           Yes
        Servers & Applications               No                   Yes [assigned Groups]
               Traffic                       No                   Yes [assigned Groups]
             ServiceDesk             Yes [“Requester”                      NA
                                          access]


                                 ZOHO Corporation Confidential
“Access Rights – User” matrix




              ZOHO Corporation Confidential
A question




             ZOHO Corporation Confidential
Creating a New Role

•Go to Admin – General – Role Management – click on Add Role
•Fill in the details requested in order. Select the appropriate
radio button – the “Yes” Radio button if you want Read-Write
access to the General modules of IT360 like Configuring Mail
Server setting, Proxy server settings, SMS Server settings, etc.
•Next, you see check boxes – one each for every module
•The Servers & Applications module will have to be checked
mandatorily with a “Client” Role at the least – this module is the
base module
•Next, select / check the other appropriate modules




                          ZOHO Corporation Confidential
Creating a New Role - screenshot




                 ZOHO Corporation Confidential
Creating a New Role – contd.

•Click Next and choose the access privileges for
each of the selected / checked modules…
•Click save
•Done! You have created a new Role with a
chosen set of access privileges. You can now
create a New User and associate this Role to the
New User!


                   ZOHO Corporation Confidential
One more question




             ZOHO Corporation Confidential
Creating a New User

•Go to Admin tab – General – click on User
Management – Add User button
•A pop up window opens up as shown in the
next slide…
•Fill in the fields in order and Save!!
•Done!



                  ZOHO Corporation Confidential
Creating a New User - screenshot




                   ZOHO Corporation Confidential
Recollecting…

Remember!

•User Management is dependent on the
underlying Role Management

•You can define your own Users and Roles and
associate them!!

                  ZOHO Corporation Confidential
Have you understood?
I hope you would have understood User
Management, Role Management and the
relationship between them as defined in IT360
Enterprise Edition and Professional Edition

Also, you now know the default User types and
Roles as supported in IT360

Creating custom User types and Roles


                  ZOHO Corporation Confidential
References
For more details, you may refer to our online help
documentation

http://www.manageengine.com/it360/help/meitms/getting-st

http
://www.manageengine.com/it360/help/meitms/manage-user

http://
www.manageengine.com/it360/help/meitms/manage-users-r




                       ZOHO Corporation Confidential
Contact Us
Write to us for any help:

It360-eval@manageengine.com

                   Thank You




                    ZOHO Corporation Confidential

Mais conteúdo relacionado

Mais procurados

Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
MJ Ferdous
 

Mais procurados (20)

Trusted systems1
Trusted systems1Trusted systems1
Trusted systems1
 
SDL: Secure design principles
SDL: Secure design principlesSDL: Secure design principles
SDL: Secure design principles
 
Identity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and RecoveryIdentity & Access Management
 Project Challenges and Recovery
Identity & Access Management
 Project Challenges and Recovery
 
Cyber Security Management.pdf
Cyber Security Management.pdfCyber Security Management.pdf
Cyber Security Management.pdf
 
Web security
Web securityWeb security
Web security
 
Cissp Training PPT
Cissp Training PPTCissp Training PPT
Cissp Training PPT
 
AI Builder Deep Dive
AI Builder Deep DiveAI Builder Deep Dive
AI Builder Deep Dive
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Operational Security
Operational SecurityOperational Security
Operational Security
 
NIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross ReferenceNIST Cybersecurity Framework Cross Reference
NIST Cybersecurity Framework Cross Reference
 
Cc unit 1 ppt
Cc unit 1 pptCc unit 1 ppt
Cc unit 1 ppt
 
Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?
 
SCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture DecisionsSCCM Intune Windows 10 Co Management Architecture Decisions
SCCM Intune Windows 10 Co Management Architecture Decisions
 
黃健瑋(解決方案架構師):Microsoft 365 資安快易通
黃健瑋(解決方案架構師):Microsoft 365 資安快易通黃健瑋(解決方案架構師):Microsoft 365 資安快易通
黃健瑋(解決方案架構師):Microsoft 365 資安快易通
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_security
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 

Destaque

User management through administration process 2307
User management through administration process 2307User management through administration process 2307
User management through administration process 2307
Hansraj Mali
 
An Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAn Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and Confluence
Atlassian
 

Destaque (20)

User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
 
User management through administration process 2307
User management through administration process 2307User management through administration process 2307
User management through administration process 2307
 
User management in joomla
User management in joomlaUser management in joomla
User management in joomla
 
User Management SaaS
User Management SaaSUser Management SaaS
User Management SaaS
 
Oracle Web Center Overview
Oracle Web Center OverviewOracle Web Center Overview
Oracle Web Center Overview
 
An Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAn Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and Confluence
 
Oracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryOracle Database Management - Backup/Recovery
Oracle Database Management - Backup/Recovery
 
MySQL 8.0 : Roles
MySQL 8.0 : RolesMySQL 8.0 : Roles
MySQL 8.0 : Roles
 
Asp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptAsp.net membership anduserroles_ppt
Asp.net membership anduserroles_ppt
 
Oracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptOracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation Concept
 
Oracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewOracle Webcenter Suite Overview
Oracle Webcenter Suite Overview
 
Les01
Les01Les01
Les01
 
Commonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizCommonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling Quiz
 
Oracle 11g concept
Oracle 11g conceptOracle 11g concept
Oracle 11g concept
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
 
Présentation Oracle DataBase 11g
Présentation Oracle DataBase 11gPrésentation Oracle DataBase 11g
Présentation Oracle DataBase 11g
 
The Role of Management at Possible
The Role of Management at PossibleThe Role of Management at Possible
The Role of Management at Possible
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oracle
 

Semelhante a User Management and Role Management in IT360

MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012
alipaiva
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajda
mvajda62
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Banking at Ho Chi Minh city
 

Semelhante a User Management and Role Management in IT360 (20)

Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIBeyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Security
 
Turn your SOA up to 11
Turn your SOA up to 11Turn your SOA up to 11
Turn your SOA up to 11
 
WAS Support & Monitoring Tools
WAS Support & Monitoring ToolsWAS Support & Monitoring Tools
WAS Support & Monitoring Tools
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
 
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
 
MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Mobile App Development 101
Mobile App Development 101Mobile App Development 101
Mobile App Development 101
 
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
 
Reactive Micro Services with Java seminar
Reactive Micro Services with Java seminarReactive Micro Services with Java seminar
Reactive Micro Services with Java seminar
 
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
 
IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)
 
Explore Android Internals
Explore Android InternalsExplore Android Internals
Explore Android Internals
 
WS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleWS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops style
 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
 
Enterprise Enabler- Presentation
Enterprise Enabler- PresentationEnterprise Enabler- Presentation
Enterprise Enabler- Presentation
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajda
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
 
Introduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersIntroduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 Developers
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

User Management and Role Management in IT360

  • 1. Role / User Management in IT360 Enterprise Edition and Professional Edition K.Lakshmi Shankar
  • 2. What you learn from this presentation? After going through this presentation, you will know: 2.What is Role Management 3.Default Roles supported in IT360 4.What is User Management 5.Default Users supported in IT360 6.The relationship between User Management and Role Management – the Role vs User matrix 7.The Role vs IT360 Module matrix 8.How to create a New User from the default available Roles 9.How to create a New Role itself and associate the same to a User Note 1: This presentation is designed to help you understand User and Role Management as defined in IT360 and hence does not cover the detailed steps on creating a custom User or a custom Role. However, relevant links to our online documents are provided for the same. On a similar note AD User import , etc., are not covered here. Note 2: The screenshots in this presentation are for representation only. The content / fields would be slightly different depending on the edition you use – Professional Edition or Enterprise Edition Central Server or Enterprise Edition Probe. ZOHO Corporation Confidential
  • 3. Definitions • Role Management is an authorization mechanism that defines which Users access which modules of IT360 • User Management is an authentication mechanism that controls the access to IT360 application to individuals of the IT Department / Organization ZOHO Corporation Confidential
  • 4. Introduction to Role Management • There are 11 Roles defined in IT360 • Some Roles provide full administrative capabilities; some provide Read-Only capabilities while some provide intermediate access • You can define your own New Role also • Users acquire access rights through their Roles • A User has to be associated to a defined Role • You can associate a Role to many Users [one to many] ZOHO Corporation Confidential
  • 5. 11 Predefined Roles in IT360 ZOHO Corporation Confidential
  • 6. Introduction to User Management •Users are an integral part of IT360 •Users acquire access rights through their Roles •A User has to be associated to a defined Role •Some of them need a full Administrator access while a few need only a Read Only access •Some of them will require an intermediate access - an administrator access to a certain limited modules of IT360 and a Read Only access to the rest of the modules •There are 8 User supported in IT360 by default •You can define your own New User •You can associate many Users to a Role [many to one] ZOHO Corporation Confidential
  • 7. 8 Predefined User in IT360 ZOHO Corporation Confidential
  • 8. The “Role – User” matrix in IT360 Role User Administrator Role admin Guest Role guest Network Administrator nwadmin Network Operator nwoperator System and Applications Administrator sysadmin System Operator sysoperator IT Administrator itadmin Operator Role operatoruser HelpDesk Technician -- HelpDesk Requestor -- HelpDesk Non Login Technician -- ZOHO Corporation Confidential
  • 9. “Role - Module Access” matrix Role: Administrator Role User: admin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Yes NA Applications Traffic Yes NA ServiceDesk Yes NA Role: Guest Role User: guest IT360 module Read Write Access Read Only Access Networks No Yes Servers & No Yes Applications Traffic No Yes ServiceDesk Yes [“Requester” NA access] ZOHO Corporation Confidential
  • 10. “Role - Module Access” matrix– contd. Role: Network Administrator User: nwadmin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Applications No No Traffic Yes NA ServiceDesk Yes [“Technician” NA access] Role: Network Operator User: nwoperator IT360 module Read Write Access Read Only Access Networks No Yes Servers & Applications No No Traffic No Yes [assigned Groups only] ServiceDesk Yes [“Technician” NA access] ZOHO Corporation Confidential
  • 11. “Role - Module Access” matrix– contd. Role: System Administrator User: sysadmin IT360 module Read Write Access Read Only Access Networks No No Servers & Yes NA Applications Traffic No No ServiceDesk Yes [“Technician” NA access] Role: System Operator User: sysoperator IT360 module Read Write Access Read Only Access Networks No Yes Servers & No Yes [assigned Applications Groups] Traffic No No ServiceDesk Yes [“Technician” NA access] ZOHO Corporation Confidential
  • 12. “Role - Module Access” matrix– contd. Role: IT Administrator User: itadmin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Applications Yes NA Traffic Yes NA ServiceDesk Yes [“Technician + NA Reporter + POApprover + Change Manager” access] Role: Operator User User: operator user IT360 module Read Write Access Read Only Access Networks No Yes Servers & Applications No Yes [assigned Groups] Traffic No Yes [assigned Groups] ServiceDesk Yes [“Requester” NA access] ZOHO Corporation Confidential
  • 13. “Access Rights – User” matrix ZOHO Corporation Confidential
  • 14. A question ZOHO Corporation Confidential
  • 15. Creating a New Role •Go to Admin – General – Role Management – click on Add Role •Fill in the details requested in order. Select the appropriate radio button – the “Yes” Radio button if you want Read-Write access to the General modules of IT360 like Configuring Mail Server setting, Proxy server settings, SMS Server settings, etc. •Next, you see check boxes – one each for every module •The Servers & Applications module will have to be checked mandatorily with a “Client” Role at the least – this module is the base module •Next, select / check the other appropriate modules ZOHO Corporation Confidential
  • 16. Creating a New Role - screenshot ZOHO Corporation Confidential
  • 17. Creating a New Role – contd. •Click Next and choose the access privileges for each of the selected / checked modules… •Click save •Done! You have created a new Role with a chosen set of access privileges. You can now create a New User and associate this Role to the New User! ZOHO Corporation Confidential
  • 18. One more question ZOHO Corporation Confidential
  • 19. Creating a New User •Go to Admin tab – General – click on User Management – Add User button •A pop up window opens up as shown in the next slide… •Fill in the fields in order and Save!! •Done! ZOHO Corporation Confidential
  • 20. Creating a New User - screenshot ZOHO Corporation Confidential
  • 21. Recollecting… Remember! •User Management is dependent on the underlying Role Management •You can define your own Users and Roles and associate them!! ZOHO Corporation Confidential
  • 22. Have you understood? I hope you would have understood User Management, Role Management and the relationship between them as defined in IT360 Enterprise Edition and Professional Edition Also, you now know the default User types and Roles as supported in IT360 Creating custom User types and Roles ZOHO Corporation Confidential
  • 23. References For more details, you may refer to our online help documentation http://www.manageengine.com/it360/help/meitms/getting-st http ://www.manageengine.com/it360/help/meitms/manage-user http:// www.manageengine.com/it360/help/meitms/manage-users-r ZOHO Corporation Confidential
  • 24. Contact Us Write to us for any help: It360-eval@manageengine.com Thank You ZOHO Corporation Confidential