SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Role / User Management in
IT360 Enterprise Edition and
Professional Edition

           K.Lakshmi Shankar
What you learn from this presentation?
 After going through this presentation, you will know:
 2.What is Role Management
 3.Default Roles supported in IT360
 4.What is User Management
 5.Default Users supported in IT360
 6.The relationship between User Management and Role Management – the Role vs
 User matrix
 7.The Role vs IT360 Module matrix
 8.How to create a New User from the default available Roles
 9.How to create a New Role itself and associate the same to a User
 Note 1: This presentation is designed to help you understand User and Role Management as defined in IT360
 and hence does not cover the detailed steps on creating a custom User or a custom Role. However, relevant
 links to our online documents are provided for the same. On a similar note AD User import , etc., are not
 covered here.
 Note 2: The screenshots in this presentation are for representation only. The content / fields would be slightly
 different depending on the edition you use – Professional Edition or Enterprise Edition Central Server or
 Enterprise Edition Probe.




                                              ZOHO Corporation Confidential
Definitions
 • Role Management is an authorization
   mechanism that defines which Users access
   which modules of IT360
 • User Management is an authentication
   mechanism that controls the access to IT360
   application to individuals of the IT Department
   / Organization




                    ZOHO Corporation Confidential
Introduction to Role Management
• There are 11 Roles defined in IT360
• Some Roles provide full administrative
  capabilities; some provide Read-Only capabilities
  while some provide intermediate access
• You can define your own New Role also
• Users acquire access rights through their Roles
• A User has to be associated to a defined Role
• You can associate a Role to many Users [one to
  many]


                    ZOHO Corporation Confidential
11 Predefined Roles in IT360




              ZOHO Corporation Confidential
Introduction to User Management

•Users are an integral part of IT360
•Users acquire access rights through their Roles
•A User has to be associated to a defined Role
•Some of them need a full Administrator access while a few need
only a Read Only access
•Some of them will require an intermediate access - an
administrator access to a certain limited modules of IT360 and a
Read Only access to the rest of the modules
•There are 8 User supported in IT360 by default
•You can define your own New User
•You can associate many Users to a Role [many to one]




                         ZOHO Corporation Confidential
8 Predefined User in IT360




              ZOHO Corporation Confidential
The “Role – User” matrix in IT360
                  Role                                             User
           Administrator Role                                      admin
               Guest Role                                          guest
         Network Administrator                                   nwadmin
            Network Operator                                    nwoperator
  System and Applications Administrator                          sysadmin
            System Operator                                     sysoperator
            IT Administrator                                      itadmin
              Operator Role                                     operatoruser
          HelpDesk Technician                                        --
           HelpDesk Requestor                                        --
     HelpDesk Non Login Technician                                   --

                                ZOHO Corporation Confidential
“Role - Module Access” matrix
      Role: Administrator Role                               User: admin
        IT360 module        Read Write Access              Read Only Access
          Networks                     Yes                       NA
          Servers &                    Yes                       NA
         Applications
            Traffic                    Yes                       NA
         ServiceDesk                   Yes                       NA
        Role: Guest Role                                       User: guest
        IT360 module        Read Write Access              Read Only Access
          Networks                     No                        Yes
          Servers &                    No                        Yes
         Applications
            Traffic                    No                        Yes
         ServiceDesk         Yes [“Requester”                    NA
                                  access]

                           ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: Network Administrator                                User: nwadmin
           IT360 module            Read Write Access             Read Only Access
             Networks                        Yes                       NA
        Servers & Applications               No                        No
               Traffic                       Yes                       NA
            ServiceDesk             Yes [“Technician”                  NA
                                         access]
        Role: Network Operator                                   User: nwoperator
           IT360 module            Read Write Access             Read Only Access
             Networks                        No                        Yes
        Servers & Applications               No                        No
               Traffic                       No                   Yes [assigned
                                                                  Groups only]
            ServiceDesk             Yes [“Technician”                  NA
                                         access]



                                 ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: System Administrator                           User: sysadmin
          IT360 module      Read Write Access              Read Only Access
            Networks                   No                        No
            Servers &                  Yes                       NA
           Applications
              Traffic                  No                        No
           ServiceDesk       Yes [“Technician”                   NA
                                  access]
        Role: System Operator                              User: sysoperator
          IT360 module      Read Write Access              Read Only Access
            Networks                   No                        Yes
            Servers &                  No                   Yes [assigned
           Applications                                       Groups]
              Traffic                  No                        No
           ServiceDesk       Yes [“Technician”                   NA
                                  access]

                           ZOHO Corporation Confidential
“Role - Module Access” matrix– contd.
        Role: IT Administrator                                         User: itadmin
           IT360 module           Read Write Access                Read Only Access
              Networks                       Yes                           NA
        Servers & Applications               Yes                           NA
               Traffic                       Yes                           NA
            ServiceDesk            Yes [“Technician +                     NA
                                      Reporter +
                                  POApprover + Change
                                    Manager” access]
         Role: Operator User                                     User: operator user
            IT360 module            Read Write Access              Read Only Access
              Networks                       No                           Yes
        Servers & Applications               No                   Yes [assigned Groups]
               Traffic                       No                   Yes [assigned Groups]
             ServiceDesk             Yes [“Requester”                      NA
                                          access]


                                 ZOHO Corporation Confidential
“Access Rights – User” matrix




              ZOHO Corporation Confidential
A question




             ZOHO Corporation Confidential
Creating a New Role

•Go to Admin – General – Role Management – click on Add Role
•Fill in the details requested in order. Select the appropriate
radio button – the “Yes” Radio button if you want Read-Write
access to the General modules of IT360 like Configuring Mail
Server setting, Proxy server settings, SMS Server settings, etc.
•Next, you see check boxes – one each for every module
•The Servers & Applications module will have to be checked
mandatorily with a “Client” Role at the least – this module is the
base module
•Next, select / check the other appropriate modules




                          ZOHO Corporation Confidential
Creating a New Role - screenshot




                 ZOHO Corporation Confidential
Creating a New Role – contd.

•Click Next and choose the access privileges for
each of the selected / checked modules…
•Click save
•Done! You have created a new Role with a
chosen set of access privileges. You can now
create a New User and associate this Role to the
New User!


                   ZOHO Corporation Confidential
One more question




             ZOHO Corporation Confidential
Creating a New User

•Go to Admin tab – General – click on User
Management – Add User button
•A pop up window opens up as shown in the
next slide…
•Fill in the fields in order and Save!!
•Done!



                  ZOHO Corporation Confidential
Creating a New User - screenshot




                   ZOHO Corporation Confidential
Recollecting…

Remember!

•User Management is dependent on the
underlying Role Management

•You can define your own Users and Roles and
associate them!!

                  ZOHO Corporation Confidential
Have you understood?
I hope you would have understood User
Management, Role Management and the
relationship between them as defined in IT360
Enterprise Edition and Professional Edition

Also, you now know the default User types and
Roles as supported in IT360

Creating custom User types and Roles


                  ZOHO Corporation Confidential
References
For more details, you may refer to our online help
documentation

http://www.manageengine.com/it360/help/meitms/getting-st

http
://www.manageengine.com/it360/help/meitms/manage-user

http://
www.manageengine.com/it360/help/meitms/manage-users-r




                       ZOHO Corporation Confidential
Contact Us
Write to us for any help:

It360-eval@manageengine.com

                   Thank You




                    ZOHO Corporation Confidential

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud management (IBM)
Cloud management (IBM)Cloud management (IBM)
Cloud management (IBM)Vivek Trivedi
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSRazak Mohammed Ali
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouKevin Fealey
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solutionhearme limited company
 
User Management - Brief Overview
User Management - Brief OverviewUser Management - Brief Overview
User Management - Brief Overviewsgillihan
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityPanda Security
 

Was ist angesagt? (20)

Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Cloud management (IBM)
Cloud management (IBM)Cloud management (IBM)
Cloud management (IBM)
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
User Management - Brief Overview
User Management - Brief OverviewUser Management - Brief Overview
User Management - Brief Overview
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 

Andere mochten auch

User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privilegesYogiji Creations
 
User management through administration process 2307
User management through administration process 2307User management through administration process 2307
User management through administration process 2307Hansraj Mali
 
User Management SaaS
User Management SaaSUser Management SaaS
User Management SaaSEmmanuel Ide
 
An Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAn Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAtlassian
 
Oracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryOracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryChien Chung Shen
 
Asp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptAsp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptShivanand Arur
 
Oracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptOracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptChien Chung Shen
 
Oracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewOracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewEslam Hafez
 
Commonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizCommonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizJonna Cadores
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql databasegourav kottawar
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureAtul Goyal
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recoveryAnne Lee
 
Présentation Oracle DataBase 11g
Présentation Oracle DataBase 11gPrésentation Oracle DataBase 11g
Présentation Oracle DataBase 11gCynapsys It Hotspot
 
The Role of Management at Possible
The Role of Management at PossibleThe Role of Management at Possible
The Role of Management at PossiblePossible
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oraclesadegh salehi
 

Andere mochten auch (20)

User, roles and privileges
User, roles and privilegesUser, roles and privileges
User, roles and privileges
 
User management through administration process 2307
User management through administration process 2307User management through administration process 2307
User management through administration process 2307
 
User management in joomla
User management in joomlaUser management in joomla
User management in joomla
 
User Management SaaS
User Management SaaSUser Management SaaS
User Management SaaS
 
Oracle Web Center Overview
Oracle Web Center OverviewOracle Web Center Overview
Oracle Web Center Overview
 
An Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and ConfluenceAn Expert's Guide to User Management in JIRA and Confluence
An Expert's Guide to User Management in JIRA and Confluence
 
Oracle Database Management - Backup/Recovery
Oracle Database Management - Backup/RecoveryOracle Database Management - Backup/Recovery
Oracle Database Management - Backup/Recovery
 
MySQL 8.0 : Roles
MySQL 8.0 : RolesMySQL 8.0 : Roles
MySQL 8.0 : Roles
 
Asp.net membership anduserroles_ppt
Asp.net membership anduserroles_pptAsp.net membership anduserroles_ppt
Asp.net membership anduserroles_ppt
 
Oracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation ConceptOracle Database Undo Segment Operation Concept
Oracle Database Undo Segment Operation Concept
 
Oracle Webcenter Suite Overview
Oracle Webcenter Suite OverviewOracle Webcenter Suite Overview
Oracle Webcenter Suite Overview
 
Les01
Les01Les01
Les01
 
Commonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling QuizCommonly Misspelled English Words Spelling Quiz
Commonly Misspelled English Words Spelling Quiz
 
Oracle 11g concept
Oracle 11g conceptOracle 11g concept
Oracle 11g concept
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
 
Présentation Oracle DataBase 11g
Présentation Oracle DataBase 11gPrésentation Oracle DataBase 11g
Présentation Oracle DataBase 11g
 
The Role of Management at Possible
The Role of Management at PossibleThe Role of Management at Possible
The Role of Management at Possible
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oracle
 

Ähnlich wie User Management and Role Management in IT360

Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIBeyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIStuart McIntyre
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Securitydkaya
 
Turn your SOA up to 11
Turn your SOA up to 11Turn your SOA up to 11
Turn your SOA up to 11Jim Siegienski
 
WAS Support & Monitoring Tools
WAS Support & Monitoring ToolsWAS Support & Monitoring Tools
WAS Support & Monitoring ToolsRoyal Cyber Inc.
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld
 
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Sverige
 
MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012alipaiva
 
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora
 
Reactive Micro Services with Java seminar
Reactive Micro Services with Java seminarReactive Micro Services with Java seminar
Reactive Micro Services with Java seminarGal Marder
 
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...Novell
 
IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)dmoranj
 
WS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleWS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleCloudOps Summit
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajdamvajda62
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Banking at Ho Chi Minh city
 
Introduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersIntroduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersSaltmarch Media
 

Ähnlich wie User Management and Role Management in IT360 (20)

Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDIBeyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
Beyond the Basics: An Overview of User LifeCycle and Managing Users with TDI
 
Microsoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 SecurityMicrosoft Days 09 Windows 2008 Security
Microsoft Days 09 Windows 2008 Security
 
Turn your SOA up to 11
Turn your SOA up to 11Turn your SOA up to 11
Turn your SOA up to 11
 
WAS Support & Monitoring Tools
WAS Support & Monitoring ToolsWAS Support & Monitoring Tools
WAS Support & Monitoring Tools
 
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments VMworld 2013: Turbo Charge Your VMware Horizon Deployments
VMworld 2013: Turbo Charge Your VMware Horizon Deployments
 
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
IBM Smarter Business 2012 - Smarta managerade övervakningstjänster baserad på...
 
MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012MIF Workshop Raquel Bortoluci Sep 2012
MIF Workshop Raquel Bortoluci Sep 2012
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Mobile App Development 101
Mobile App Development 101Mobile App Development 101
Mobile App Development 101
 
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
 
Reactive Micro Services with Java seminar
Reactive Micro Services with Java seminarReactive Micro Services with Java seminar
Reactive Micro Services with Java seminar
 
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
What's LUM Got To Do with It: Deployment Considerations for Linux User Manage...
 
IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)IoT Agents (With Lightweight M2M)
IoT Agents (With Lightweight M2M)
 
Explore Android Internals
Explore Android InternalsExplore Android Internals
Explore Android Internals
 
WS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops styleWS: Kohler, Logica - Running operations devops style
WS: Kohler, Logica - Running operations devops style
 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
 
Enterprise Enabler- Presentation
Enterprise Enabler- PresentationEnterprise Enabler- Presentation
Enterprise Enabler- Presentation
 
Ca today here and_now_martin_vajda
Ca today here and_now_martin_vajdaCa today here and_now_martin_vajda
Ca today here and_now_martin_vajda
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
 
Introduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 DevelopersIntroduction to WCF RIA Services for Silverlight 4 Developers
Introduction to WCF RIA Services for Silverlight 4 Developers
 

Kürzlich hochgeladen

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

User Management and Role Management in IT360

  • 1. Role / User Management in IT360 Enterprise Edition and Professional Edition K.Lakshmi Shankar
  • 2. What you learn from this presentation? After going through this presentation, you will know: 2.What is Role Management 3.Default Roles supported in IT360 4.What is User Management 5.Default Users supported in IT360 6.The relationship between User Management and Role Management – the Role vs User matrix 7.The Role vs IT360 Module matrix 8.How to create a New User from the default available Roles 9.How to create a New Role itself and associate the same to a User Note 1: This presentation is designed to help you understand User and Role Management as defined in IT360 and hence does not cover the detailed steps on creating a custom User or a custom Role. However, relevant links to our online documents are provided for the same. On a similar note AD User import , etc., are not covered here. Note 2: The screenshots in this presentation are for representation only. The content / fields would be slightly different depending on the edition you use – Professional Edition or Enterprise Edition Central Server or Enterprise Edition Probe. ZOHO Corporation Confidential
  • 3. Definitions • Role Management is an authorization mechanism that defines which Users access which modules of IT360 • User Management is an authentication mechanism that controls the access to IT360 application to individuals of the IT Department / Organization ZOHO Corporation Confidential
  • 4. Introduction to Role Management • There are 11 Roles defined in IT360 • Some Roles provide full administrative capabilities; some provide Read-Only capabilities while some provide intermediate access • You can define your own New Role also • Users acquire access rights through their Roles • A User has to be associated to a defined Role • You can associate a Role to many Users [one to many] ZOHO Corporation Confidential
  • 5. 11 Predefined Roles in IT360 ZOHO Corporation Confidential
  • 6. Introduction to User Management •Users are an integral part of IT360 •Users acquire access rights through their Roles •A User has to be associated to a defined Role •Some of them need a full Administrator access while a few need only a Read Only access •Some of them will require an intermediate access - an administrator access to a certain limited modules of IT360 and a Read Only access to the rest of the modules •There are 8 User supported in IT360 by default •You can define your own New User •You can associate many Users to a Role [many to one] ZOHO Corporation Confidential
  • 7. 8 Predefined User in IT360 ZOHO Corporation Confidential
  • 8. The “Role – User” matrix in IT360 Role User Administrator Role admin Guest Role guest Network Administrator nwadmin Network Operator nwoperator System and Applications Administrator sysadmin System Operator sysoperator IT Administrator itadmin Operator Role operatoruser HelpDesk Technician -- HelpDesk Requestor -- HelpDesk Non Login Technician -- ZOHO Corporation Confidential
  • 9. “Role - Module Access” matrix Role: Administrator Role User: admin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Yes NA Applications Traffic Yes NA ServiceDesk Yes NA Role: Guest Role User: guest IT360 module Read Write Access Read Only Access Networks No Yes Servers & No Yes Applications Traffic No Yes ServiceDesk Yes [“Requester” NA access] ZOHO Corporation Confidential
  • 10. “Role - Module Access” matrix– contd. Role: Network Administrator User: nwadmin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Applications No No Traffic Yes NA ServiceDesk Yes [“Technician” NA access] Role: Network Operator User: nwoperator IT360 module Read Write Access Read Only Access Networks No Yes Servers & Applications No No Traffic No Yes [assigned Groups only] ServiceDesk Yes [“Technician” NA access] ZOHO Corporation Confidential
  • 11. “Role - Module Access” matrix– contd. Role: System Administrator User: sysadmin IT360 module Read Write Access Read Only Access Networks No No Servers & Yes NA Applications Traffic No No ServiceDesk Yes [“Technician” NA access] Role: System Operator User: sysoperator IT360 module Read Write Access Read Only Access Networks No Yes Servers & No Yes [assigned Applications Groups] Traffic No No ServiceDesk Yes [“Technician” NA access] ZOHO Corporation Confidential
  • 12. “Role - Module Access” matrix– contd. Role: IT Administrator User: itadmin IT360 module Read Write Access Read Only Access Networks Yes NA Servers & Applications Yes NA Traffic Yes NA ServiceDesk Yes [“Technician + NA Reporter + POApprover + Change Manager” access] Role: Operator User User: operator user IT360 module Read Write Access Read Only Access Networks No Yes Servers & Applications No Yes [assigned Groups] Traffic No Yes [assigned Groups] ServiceDesk Yes [“Requester” NA access] ZOHO Corporation Confidential
  • 13. “Access Rights – User” matrix ZOHO Corporation Confidential
  • 14. A question ZOHO Corporation Confidential
  • 15. Creating a New Role •Go to Admin – General – Role Management – click on Add Role •Fill in the details requested in order. Select the appropriate radio button – the “Yes” Radio button if you want Read-Write access to the General modules of IT360 like Configuring Mail Server setting, Proxy server settings, SMS Server settings, etc. •Next, you see check boxes – one each for every module •The Servers & Applications module will have to be checked mandatorily with a “Client” Role at the least – this module is the base module •Next, select / check the other appropriate modules ZOHO Corporation Confidential
  • 16. Creating a New Role - screenshot ZOHO Corporation Confidential
  • 17. Creating a New Role – contd. •Click Next and choose the access privileges for each of the selected / checked modules… •Click save •Done! You have created a new Role with a chosen set of access privileges. You can now create a New User and associate this Role to the New User! ZOHO Corporation Confidential
  • 18. One more question ZOHO Corporation Confidential
  • 19. Creating a New User •Go to Admin tab – General – click on User Management – Add User button •A pop up window opens up as shown in the next slide… •Fill in the fields in order and Save!! •Done! ZOHO Corporation Confidential
  • 20. Creating a New User - screenshot ZOHO Corporation Confidential
  • 21. Recollecting… Remember! •User Management is dependent on the underlying Role Management •You can define your own Users and Roles and associate them!! ZOHO Corporation Confidential
  • 22. Have you understood? I hope you would have understood User Management, Role Management and the relationship between them as defined in IT360 Enterprise Edition and Professional Edition Also, you now know the default User types and Roles as supported in IT360 Creating custom User types and Roles ZOHO Corporation Confidential
  • 23. References For more details, you may refer to our online help documentation http://www.manageengine.com/it360/help/meitms/getting-st http ://www.manageengine.com/it360/help/meitms/manage-user http:// www.manageengine.com/it360/help/meitms/manage-users-r ZOHO Corporation Confidential
  • 24. Contact Us Write to us for any help: It360-eval@manageengine.com Thank You ZOHO Corporation Confidential