Roles Used to Restrict Access

Roles also restrict access to element properties, element records, and Provisioning Manager, as shown in Table 26 on page 351.

Table 26 Default Role Privileges by Elements

Role

Element

 

 

 

 

 

 

 

 

 

 

 

 

 

Application

Host

Switch

Storage

Tape

Others

 

 

 

 

System

Library

 

 

 

 

 

 

 

 

CIO

View

View

View

View

View

View

 

 

 

 

 

 

 

Domain

Full Control

Full

Full

Full Control

Full

Full

Administrator

 

Control

Control

 

Control

Control

 

 

 

 

 

 

 

Storage

View

View

Full

Full Control

Full

Full

Administrator

 

 

Control

 

Control

Control

 

 

 

 

 

 

 

Server

View

Full

View

View

View

View

Administrator

 

Control

 

 

 

 

 

 

 

 

 

 

 

Application

Full Control

View

View

View

View

View

Administrator

 

 

 

 

 

 

 

 

 

 

 

 

 

Help Desk

View

View

View

View

View

View

 

 

 

 

 

 

 

SIMViewOnly

View

View

View

View

View

View

 

 

 

 

 

 

 

Options for Restricting a Role

In addition, you can assign one of the following options within a role to further allow or restrict access for a specific element:

Full Control — Lets you view and modify the record for the element on the Asset Management tab, and perform provisioning if applicable.

Element Control — Lets you view and modify the record for the element on the Asset Management tab. You cannot perform provisioning.

View — Lets you only view element properties.

For example, if users belong to a role that only lets them view the element properties on storage systems, those users would not be allowed to perform provisioning on storage systems because their role does not have the Full Control option selected for storage systems. That same role could also have the Full Control option selected for switches, allowing the user to perform provisioning for switches. Thus, the user would not be able to provision storage systems, but would be able to provision switches.

You can modify roles and/or create new ones. For example, you can modify the Help Desk role so that the users assigned to this role can also view Reporter and modify servers.

352 Managing Security