SlideShare une entreprise Scribd logo
1  sur  24
Role / User Management in
IT360 Enterprise Edition and
Professional Edition

           K.Lakshmi Shankar
What you learn from this presentation?
 After going through this presentation, you will know:
 2.What is Role Management
 3.Default Roles supported in IT360
 4.What is User Management
 5.Default Users supported in IT360
 6.The relationship between User Management and Role Management – the Role vs
 User matrix
 7.The Role vs IT360 Module matrix
 8.How to create a New User from the default available Roles
 9.How to create a New Role itself and associate the same to a User
 Note 1: This presentation is designed to help you understand User and Role Management as defined in IT360
 and hence does not cover the detailed steps on creating a custom User or a custom Role. However, relevant
 links to our online documents are provided for the same. On a similar note AD User import , etc., are not
 covered here.
 Note 2: The screenshots in this presentation are for representation only. The content / fields would be slightly
 different depending on the edition you use – Professional Edition or Enterprise Edition Central Server or
 Enterprise Edition Probe.




                                              ZOHO Corporation Confidential
Definitions
 • Role Management is an authorization
   mechanism that defines which Users access
   which modules of IT360
 • User Management is an authentication
   mechanism that controls the access to IT360
   application to individuals of the IT Department
   / Organization




                    ZOHO Corporation Confidential
Introduction to Role Management
• There are 11 Roles defined in IT360
• Some Roles provide full administrative
  capabilities; some provide Read-Only capabilities
  while some provide intermediate access
• You can define your own New Role also
• Users acquire access rights through their Roles
• A User has to be associated to a defined Role
• You can associate a Role to many Users [one to
  many]


                    ZOHO Corporation Confidential
11 Predefined Roles in IT360




              ZOHO Corporation Confidential
Introduction to User Management

•Users are an integral part of IT360
•Users acquire access rights through their Roles
•A User has to be associated to a defined Role
•Some of them need a full Administrator access while a few need
only a Read Only access
•Some of them will require an intermediate access - an
administrator access to a certain limited modules of IT360 and a
Read Only access to the rest of the modules
•There are 8 User supported in IT360 by default
•You can define your own New User
•You can associate many Users to a Role [many to one]




                         ZOHO Corporation Confidential
8 Predefined User in IT360




              ZOHO Corporation Confidential
The “Role – User” matrix in IT360
                  Role                                             User
           Administrator Role                                      admin
               Guest Role                                          guest
         Network Administrator                                   nwadmin
            Network Operator                                    nwoperator
  System and Applications Administrator                          sysadmin
            System Operator                                     sysoperator
            IT Administrator                                      itadmin
              Operator Role                                     operatoruser
          HelpDesk Technician                                        --
           HelpDesk Requestor                                        --
     HelpDesk Non Login Technician                                   --

                                ZOHO Corporation Confidential
“Role - Module Access” matrix
      Role: Administrator Role                               User: admin
        IT360 module        Read Write Access              Read Only Access
          Networks                     Yes                       NA
          Servers &                    Yes                       NA
         Applications
            Traffic                    Yes                       NA
         ServiceDesk                   Yes                       NA
        Role: Guest Role                                       User: guest
        IT360 module        Read Write Access              Read Only Access
          Networks                     No                        Yes
          Servers &                    No                        Yes
         Applications
            Traffic                    No                        Yes
         ServiceDesk         Yes [“Requester”                    NA
                                  access]

                           ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: Network Administrator                                User: nwadmin
           IT360 module            Read Write Access             Read Only Access
             Networks                        Yes                       NA
        Servers & Applications               No                        No
               Traffic                       Yes                       NA
            ServiceDesk             Yes [“Technician”                  NA
                                         access]
        Role: Network Operator                                   User: nwoperator
           IT360 module            Read Write Access             Read Only Access
             Networks                        No                        Yes
        Servers & Applications               No                        No
               Traffic                       No                   Yes [assigned
                                                                  Groups only]
            ServiceDesk             Yes [“Technician”                  NA
                                         access]



                                 ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: System Administrator                           User: sysadmin
          IT360 module      Read Write Access              Read Only Access
            Networks                   No                        No
            Servers &                  Yes                       NA
           Applications
              Traffic                  No                        No
           ServiceDesk       Yes [“Technician”                   NA
                                  access]
        Role: System Operator                              User: sysoperator
          IT360 module      Read Write Access              Read Only Access
            Networks                   No                        Yes
            Servers &                  No                   Yes [assigned
           Applications                                       Groups]
              Traffic                  No                        No
           ServiceDesk       Yes [“Technician”                   NA
                                  access]

                           ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: IT Administrator                                         User: itadmin
           IT360 module           Read Write Access                Read Only Access
              Networks                       Yes                           NA
        Servers & Applications               Yes                           NA
               Traffic                       Yes                           NA
            ServiceDesk            Yes [“Technician +                     NA
                                      Reporter +
                                  POApprover + Change
                                    Manager” access]
         Role: Operator User                                     User: operator user
            IT360 module            Read Write Access              Read Only Access
              Networks                       No                           Yes
        Servers & Applications               No                   Yes [assigned Groups]
               Traffic                       No                   Yes [assigned Groups]
             ServiceDesk             Yes [“Requester”                      NA
                                          access]


                                 ZOHO Corporation Confidential
“Access Rights – User” matrix




              ZOHO Corporation Confidential
A question




             ZOHO Corporation Confidential
Creating a New Role

•Go to Admin – General – Role Management – click on Add Role
•Fill in the details requested in order. Select the appropriate
radio button – the “Yes” Radio button if you want Read-Write
access to the General modules of IT360 like Configuring Mail
Server setting, Proxy server settings, SMS Server settings, etc.
•Next, you see check boxes – one each for every module
•The Servers & Applications module will have to be checked
mandatorily with a “Client” Role at the least – this module is the
base module
•Next, select / check the other appropriate modules




                          ZOHO Corporation Confidential
Creating a New Role - screenshot




                 ZOHO Corporation Confidential
Creating a New Role – contd.

•Click Next and choose the access privileges for
each of the selected / checked modules…
•Click save
•Done! You have created a new Role with a
chosen set of access privileges. You can now
create a New User and associate this Role to the
New User!


                   ZOHO Corporation Confidential
One more question




             ZOHO Corporation Confidential
Creating a New User

•Go to Admin tab – General – click on User
Management – Add User button
•A pop up window opens up as shown in the
next slide…
•Fill in the fields in order and Save!!
•Done!



                  ZOHO Corporation Confidential
Creating a New User - screenshot




                   ZOHO Corporation Confidential
Recollecting…

Remember!

•User Management is dependent on the
underlying Role Management

•You can define your own Users and Roles and
associate them!!

                  ZOHO Corporation Confidential
Have you understood?
I hope you would have understood User
Management, Role Management and the
relationship between them as defined in IT360
Enterprise Edition and Professional Edition

Also, you now know the default User types and
Roles as supported in IT360

Creating custom User types and Roles


                  ZOHO Corporation Confidential
References
For more details, you may refer to our online help
documentation

http://www.manageengine.com/it360/help/meitms/getting-st

http
://www.manageengine.com/it360/help/meitms/manage-user

http://
www.manageengine.com/it360/help/meitms/manage-users-r




                       ZOHO Corporation Confidential
Contact Us
Write to us for any help:

It360-eval@manageengine.com

                   Thank You




                    ZOHO Corporation Confidential

Contenu connexe

Tendances

Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Electricity billing-system-project-on-jsp
Electricity billing-system-project-on-jspElectricity billing-system-project-on-jsp
Electricity billing-system-project-on-jspFreeprojectz
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement SpecificationKishan Kaushik
 
introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administrationgamme123
 
Requirement and Specification
Requirement and SpecificationRequirement and Specification
Requirement and Specificationsarojsaroza
 
Data Flow Diagram - Level 0.pdf
Data Flow Diagram - Level 0.pdfData Flow Diagram - Level 0.pdf
Data Flow Diagram - Level 0.pdfAbhasAbhirup
 
e-Learning Management System : a Critical Study
e-Learning Management System : a Critical Studye-Learning Management System : a Critical Study
e-Learning Management System : a Critical StudyKaustav Saha
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityRubal Sagwal
 
ONLINE PORTAL WITH COMPILER USING C#
ONLINE  PORTAL WITH COMPILER USING C#ONLINE  PORTAL WITH COMPILER USING C#
ONLINE PORTAL WITH COMPILER USING C#Pritam Guchhait
 
Payroll management system_synopsis
Payroll management system_synopsisPayroll management system_synopsis
Payroll management system_synopsisSameer Bhatt
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testingecmee
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCUKhalid Rehan
 

Tendances (20)

Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Electricity billing-system-project-on-jsp
Electricity billing-system-project-on-jspElectricity billing-system-project-on-jsp
Electricity billing-system-project-on-jsp
 
Features of payroll system
Features of  payroll systemFeatures of  payroll system
Features of payroll system
 
Process models
Process modelsProcess models
Process models
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Use case Diagram
Use case DiagramUse case Diagram
Use case Diagram
 
introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administration
 
Requirement and Specification
Requirement and SpecificationRequirement and Specification
Requirement and Specification
 
Data Flow Diagram - Level 0.pdf
Data Flow Diagram - Level 0.pdfData Flow Diagram - Level 0.pdf
Data Flow Diagram - Level 0.pdf
 
e-Learning Management System : a Critical Study
e-Learning Management System : a Critical Studye-Learning Management System : a Critical Study
e-Learning Management System : a Critical Study
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
ONLINE PORTAL WITH COMPILER USING C#
ONLINE  PORTAL WITH COMPILER USING C#ONLINE  PORTAL WITH COMPILER USING C#
ONLINE PORTAL WITH COMPILER USING C#
 
Payroll management system_synopsis
Payroll management system_synopsisPayroll management system_synopsis
Payroll management system_synopsis
 
Chapter14
Chapter14Chapter14
Chapter14
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Cyber security
Cyber securityCyber security
Cyber security
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCU
 
Domain object model
Domain object modelDomain object model
Domain object model
 

En vedette

User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privilegesYogiji Creations
 
User management through administration process 2307
User management through administration process 2307User management through administration process 2307
User management through administration process 2307Hansraj Mali
 
User Management SaaS
User Management SaaSUser Management SaaS
User Management SaaSEmmanuel Ide
 
An Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAn Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAtlassian
 
Oracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryOracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryChien Chung Shen
 
Asp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptAsp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptShivanand Arur
 
Oracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptOracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptChien Chung Shen
 
Oracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewOracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewEslam Hafez
 
Commonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizCommonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizJonna Cadores
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql databasegourav kottawar
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureAtul Goyal
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recoveryAnne Lee
 
Présentation Oracle DataBase 11g
Présentation Oracle DataBase 11gPrésentation Oracle DataBase 11g
Présentation Oracle DataBase 11gCynapsys It Hotspot
 
The Role of Management at Possible
The Role of Management at PossibleThe Role of Management at Possible
The Role of Management at PossiblePossible
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oraclesadegh salehi
 

En vedette (20)

User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
 
User management through administration process 2307
User management through administration process 2307User management through administration process 2307
User management through administration process 2307
 
User management in joomla
User management in joomlaUser management in joomla
User management in joomla
 
User Management SaaS
User Management SaaSUser Management SaaS
User Management SaaS
 
Oracle Web Center Overview
Oracle Web Center OverviewOracle Web Center Overview
Oracle Web Center Overview
 
An Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAn Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and Confluence
 
Oracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryOracle Database Management - Backup/Recovery
Oracle Database Management - Backup/Recovery
 
MySQL 8.0 : Roles
MySQL 8.0 : RolesMySQL 8.0 : Roles
MySQL 8.0 : Roles
 
Asp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptAsp.net membership anduserroles_ppt
Asp.net membership anduserroles_ppt
 
Oracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptOracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation Concept
 
Oracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewOracle Webcenter Suite Overview
Oracle Webcenter Suite Overview
 
Les01
Les01Les01
Les01
 
Commonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizCommonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling Quiz
 
Oracle 11g concept
Oracle 11g conceptOracle 11g concept
Oracle 11g concept
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
 
Présentation Oracle DataBase 11g
Présentation Oracle DataBase 11gPrésentation Oracle DataBase 11g
Présentation Oracle DataBase 11g
 
The Role of Management at Possible
The Role of Management at PossibleThe Role of Management at Possible
The Role of Management at Possible
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oracle
 

Similaire à Role and User Management in IT360

Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIBeyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIStuart McIntyre
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Securitydkaya
 
Turn your SOA up to 11
Turn your SOA up to 11Turn your SOA up to 11
Turn your SOA up to 11Jim Siegienski
 
WAS Support & Monitoring Tools
WAS Support & Monitoring ToolsWAS Support & Monitoring Tools
WAS Support & Monitoring ToolsRoyal Cyber Inc.
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld
 
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Sverige
 
MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012alipaiva
 
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora
 
Reactive Micro Services with Java seminar
Reactive Micro Services with Java seminarReactive Micro Services with Java seminar
Reactive Micro Services with Java seminarGal Marder
 
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...Novell
 
IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)dmoranj
 
WS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleWS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleCloudOps Summit
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajdamvajda62
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Banking at Ho Chi Minh city
 
Introduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersIntroduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersSaltmarch Media
 

Similaire à Role and User Management in IT360 (20)

Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIBeyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Security
 
Turn your SOA up to 11
Turn your SOA up to 11Turn your SOA up to 11
Turn your SOA up to 11
 
WAS Support & Monitoring Tools
WAS Support & Monitoring ToolsWAS Support & Monitoring Tools
WAS Support & Monitoring Tools
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
 
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
 
MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Mobile App Development 101
Mobile App Development 101Mobile App Development 101
Mobile App Development 101
 
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
 
Reactive Micro Services with Java seminar
Reactive Micro Services with Java seminarReactive Micro Services with Java seminar
Reactive Micro Services with Java seminar
 
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
 
IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)
 
Explore Android Internals
Explore Android InternalsExplore Android Internals
Explore Android Internals
 
WS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleWS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops style
 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
 
Enterprise Enabler- Presentation
Enterprise Enabler- PresentationEnterprise Enabler- Presentation
Enterprise Enabler- Presentation
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajda
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
 
Introduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersIntroduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 Developers
 

Dernier

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Role and User Management in IT360

  • 1. Role / User Management in IT360 Enterprise Edition and Professional Edition K.Lakshmi Shankar
  • 2. What you learn from this presentation? After going through this presentation, you will know: 2.What is Role Management 3.Default Roles supported in IT360 4.What is User Management 5.Default Users supported in IT360 6.The relationship between User Management and Role Management – the Role vs User matrix 7.The Role vs IT360 Module matrix 8.How to create a New User from the default available Roles 9.How to create a New Role itself and associate the same to a User Note 1: This presentation is designed to help you understand User and Role Management as defined in IT360 and hence does not cover the detailed steps on creating a custom User or a custom Role. However, relevant links to our online documents are provided for the same. On a similar note AD User import , etc., are not covered here. Note 2: The screenshots in this presentation are for representation only. The content / fields would be slightly different depending on the edition you use – Professional Edition or Enterprise Edition Central Server or Enterprise Edition Probe. ZOHO Corporation Confidential
  • 3. Definitions • Role Management is an authorization mechanism that defines which Users access which modules of IT360 • User Management is an authentication mechanism that controls the access to IT360 application to individuals of the IT Department / Organization ZOHO Corporation Confidential
  • 4. Introduction to Role Management • There are 11 Roles defined in IT360 • Some Roles provide full administrative capabilities; some provide Read-Only capabilities while some provide intermediate access • You can define your own New Role also • Users acquire access rights through their Roles • A User has to be associated to a defined Role • You can associate a Role to many Users [one to many] ZOHO Corporation Confidential
  • 5. 11 Predefined Roles in IT360 ZOHO Corporation Confidential
  • 6. Introduction to User Management •Users are an integral part of IT360 •Users acquire access rights through their Roles •A User has to be associated to a defined Role •Some of them need a full Administrator access while a few need only a Read Only access •Some of them will require an intermediate access - an administrator access to a certain limited modules of IT360 and a Read Only access to the rest of the modules •There are 8 User supported in IT360 by default •You can define your own New User •You can associate many Users to a Role [many to one] ZOHO Corporation Confidential
  • 7. 8 Predefined User in IT360 ZOHO Corporation Confidential
  • 8. The “Role – User” matrix in IT360 Role User Administrator Role admin Guest Role guest Network Administrator nwadmin Network Operator nwoperator System and Applications Administrator sysadmin System Operator sysoperator IT Administrator itadmin Operator Role operatoruser HelpDesk Technician -- HelpDesk Requestor -- HelpDesk Non Login Technician -- ZOHO Corporation Confidential
  • 9. “Role - Module Access” matrix Role: Administrator Role User: admin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Yes NA Applications Traffic Yes NA ServiceDesk Yes NA Role: Guest Role User: guest IT360 module Read Write Access Read Only Access Networks No Yes Servers & No Yes Applications Traffic No Yes ServiceDesk Yes [“Requester” NA access] ZOHO Corporation Confidential
  • 10. “Role - Module Access” matrix– contd. Role: Network Administrator User: nwadmin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Applications No No Traffic Yes NA ServiceDesk Yes [“Technician” NA access] Role: Network Operator User: nwoperator IT360 module Read Write Access Read Only Access Networks No Yes Servers & Applications No No Traffic No Yes [assigned Groups only] ServiceDesk Yes [“Technician” NA access] ZOHO Corporation Confidential
  • 11. “Role - Module Access” matrix– contd. Role: System Administrator User: sysadmin IT360 module Read Write Access Read Only Access Networks No No Servers & Yes NA Applications Traffic No No ServiceDesk Yes [“Technician” NA access] Role: System Operator User: sysoperator IT360 module Read Write Access Read Only Access Networks No Yes Servers & No Yes [assigned Applications Groups] Traffic No No ServiceDesk Yes [“Technician” NA access] ZOHO Corporation Confidential
  • 12. “Role - Module Access” matrix– contd. Role: IT Administrator User: itadmin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Applications Yes NA Traffic Yes NA ServiceDesk Yes [“Technician + NA Reporter + POApprover + Change Manager” access] Role: Operator User User: operator user IT360 module Read Write Access Read Only Access Networks No Yes Servers & Applications No Yes [assigned Groups] Traffic No Yes [assigned Groups] ServiceDesk Yes [“Requester” NA access] ZOHO Corporation Confidential
  • 13. “Access Rights – User” matrix ZOHO Corporation Confidential
  • 14. A question ZOHO Corporation Confidential
  • 15. Creating a New Role •Go to Admin – General – Role Management – click on Add Role •Fill in the details requested in order. Select the appropriate radio button – the “Yes” Radio button if you want Read-Write access to the General modules of IT360 like Configuring Mail Server setting, Proxy server settings, SMS Server settings, etc. •Next, you see check boxes – one each for every module •The Servers & Applications module will have to be checked mandatorily with a “Client” Role at the least – this module is the base module •Next, select / check the other appropriate modules ZOHO Corporation Confidential
  • 16. Creating a New Role - screenshot ZOHO Corporation Confidential
  • 17. Creating a New Role – contd. •Click Next and choose the access privileges for each of the selected / checked modules… •Click save •Done! You have created a new Role with a chosen set of access privileges. You can now create a New User and associate this Role to the New User! ZOHO Corporation Confidential
  • 18. One more question ZOHO Corporation Confidential
  • 19. Creating a New User •Go to Admin tab – General – click on User Management – Add User button •A pop up window opens up as shown in the next slide… •Fill in the fields in order and Save!! •Done! ZOHO Corporation Confidential
  • 20. Creating a New User - screenshot ZOHO Corporation Confidential
  • 21. Recollecting… Remember! •User Management is dependent on the underlying Role Management •You can define your own Users and Roles and associate them!! ZOHO Corporation Confidential
  • 22. Have you understood? I hope you would have understood User Management, Role Management and the relationship between them as defined in IT360 Enterprise Edition and Professional Edition Also, you now know the default User types and Roles as supported in IT360 Creating custom User types and Roles ZOHO Corporation Confidential
  • 23. References For more details, you may refer to our online help documentation http://www.manageengine.com/it360/help/meitms/getting-st http ://www.manageengine.com/it360/help/meitms/manage-user http:// www.manageengine.com/it360/help/meitms/manage-users-r ZOHO Corporation Confidential
  • 24. Contact Us Write to us for any help: It360-eval@manageengine.com Thank You ZOHO Corporation Confidential