Roles & Privileges
Access control within Infraon is managed through role-based privileges. A Role defines a user's role within Infraon, and Privileges define the user's level of access across multiple modules of Infraon. Infraon comes with seven default roles with pre-defined privileges.
What you see on the screen
On Infraon, multiple default roles are displayed as a list with icons for editing, cloning, and deleting. The 'New Role' button is at the top right corner of the page.
Details displayed are as follows:
Role Name
User Count
Role Description
Icons to edit/clone/delete
Roles
While Infraon comes with seven default roles, you can edit an existing role's privileges and add a new one to suit your needs.
Role
Description
Requester
Are end-users who have access only to the requester portal from where they can raise incidents, service & change requests and go through the complete Knowledge Base?
Tech Support Operator
Are users part of the technical support team that provides technical support to end-users/requesters?
A Technical Support Operator can access Service Catalog, Workflow, Assets, user Dashboards, and Reports. A Tech Support Operator also has privileges to add and edit Incidents.
Tech Support Manager
Are users with privileges of a Requester + Tech support operator + admin privileges to manage the assigned team?
By default, a Tech Support Manager has privileges to add Fixed Assets, add/edit/delete Tech Support Operators, add/edit/delete Incidents, Dashboards, and Reports.
NOC Operator
Are users assigned to monitor the organization's network and have all the privileges of Tech Support operators?
By default, a NOC Operator has complete privileges over Alarms, Events, and Notifications.
IT Support Operator
Are users assigned to monitor and provide IT infrastructure-related support?
By default, an IT Support operator has privileges to add /edit Discovery Profiles, add/edit assets through Discovery/CSV (on approval), and complete privileges over Alarms, Monitoring Dashboards*, Monitoring Reports*, and Notifications.
Administrator
Are users with complete access across all modules of Infraon
Note: The 'Administrator' role cannot be cloned/edited/deleted.
*Monitoring Dashboards and reports are those dashboards/reports assigned to the user to enable monitoring.
Instructions to 'Add a new Role.'
Go to Infraon Configuration -> User Management -> Role and Privileges
Click on the 'New Role' button in the top right corner.
Privileges for default roles are saved as templates and can be selected and customized to suit needs. Privileges are customized at the ‘General,’ ‘Ticket,’ ‘NCCM,’ ‘Privacy Settings,’ and ‘Reports’ levels.
Label
Action
Description/Example
Role Name*
Add a name for the new role.
Manager, Support Team, L1 Support, etc.,
Select Template
Select a template to import privileges.
Selecting existing role templates helps import privileges from an existing role to the new role.
Description
Add a brief description of the role.
Assign to L1 support members of the team.
Privileges
Select privileges to enable access to the new role.
Privileges are split into modules: General, Ticket, NCCM, Privacy Settings, and Reports.
Permissions can be explicitly selected - view, add, edit, delete, copy, and configure.
Privileges
The Privileges module within Infraon Infinity empowers administrators with granular control over user permissions. This ensures users have the necessary access to perform their tasks effectively while safeguarding sensitive data within the platform.
Here, admins can define specific actions/modules that users can perform within each module using checkboxes. These levels include:
Label
Action
Description/Example
View
If selected, the 'View' privilege allows the user only to view the selected module/page.
For example, if the user is given the 'View' privilege to the 'Business Catalogue' module, the user will be able to view the services listed.
Add
If selected, 'Add' allows the user to view and perform add operations within the selected module/page.
For example, if the user is given the 'Add' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and add new services. The user will, however, not have edit or delete privileges.
Edit
If selected, 'Edit' allows the user to view and perform edit operations within the selected module/page.
For example, if the user is given the 'Edit' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and edit existing services. The user will, however, not have add or delete privileges.
Delete
If selected, 'Delete' allows the user to view and perform add operations within the selected module/page.
For example, if the user is given the 'Delete' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and delete existing services. The user will, however, not have to add or edit privileges.
Copy
If selected, 'Copy' allows the user to view and perform add operations within the selected module/page.
For example, if the user is given the 'Copy' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and add new services. The user will, however, not have edit or delete privileges.
Configure
If selected, 'Configure' allows the user to view and perform add operations within the selected module/page.
For example, if the user is given the 'Add' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and add new services. The user will, however, not have edit or delete privileges.
Upload
If selected, ‘Upload' allows the user to view and perform add operations within the selected module/page
Download
If selected, ‘Download’ allows users to download and perform export operations within the selected module/page.
The Download privilege allows users to export logs from the Log Management module in PDF, CSV, or XLS formats, enabling offline analysis, sharing, and integration with other tools.
Here's a breakdown of the functionalities offered by the Privileges module and its sub-modules:
General:
Grant access to various Infraon Infinity modules:
Agent
API Registration
Audit
Business Hour
Bot Configuration
Business Rule
Business Catalogue
Change
CI Relation rule
Asset
Contract Management
Correlation Rule
CSAT
Client Registration
Dashboard
Department
Device Credentials
Diagnosis Tools
Discovery
Events
Geomap
Holiday
IMACD
Mail Automator
Jobs
Knowledge Base
Leaves
Maintenance
Messenger
My Profile
Network Configuration
Network Diagram
Organization
Address Book
Password Policy
Problem
Release
Request
Requester
Service Catalogue
Shift
SLA
SMS Gateway
Software License
SSP Configuration
Tag
Task
Team Escalation
Teams
Template
Thresholds
Topology
Trigger
Technician
Role
Vendor
Workflow
Workspace
Log Management:
Manage user access to functionalities related to Log Management and configurations. This sub-module offers permissions for:
Log Multi-Index: Create and manage the multi-indexes that help retrieve data from Elasticsearch.
Log Export Configs: Export Configs define how logs are exported, including format, size, and downloaded exported log files.
Log Search: Enables rapid searching and analysis of vast amounts of structured and unstructured log data, delivering results in seconds.
Log Rule: A critical component in monitoring systems that defines how log data is processed and analyzed in real-time to quickly detect and respond to security threats.
Ticket:
Define permission levels (Add, View, Edit, Delete, etc.) for different user roles regarding ticket management tasks. This allows for granular control over how users interact with tickets within the system.
NCCM (Network Change & Configuration Management):
Manage user access to functionalities related to network changes and configurations. This sub-module offers permissions for:
Baseline Scheduler: Control access to scheduling tasks for network baseline configuration.
Configuration Download Job: Manage permissions for initiating downloads of network configuration data.
Configuration Parameters: Define user access to view or modify network configuration parameters.
Configuration Profiles: A configuration profile is a template or predefined set of configuration settings that network administrators can create and customize configuration profiles with information like device details and connection protocols for SSH and Telnet.
Configuration Search: Configuration Search specifically focuses on download jobs, allowing users to view or export the "startup" or "running" configurations within these jobs to identify any configuration.
Configuration template: Configuration templates hold the commands for uploading jobs and making changes to network devices, including provisioning, OS upgrades, creating or deactivating services, and any other change.
OS Image: OS images are used primarily for managing and deploying configuration changes across network devices such as routers, switches, and firewalls.
Privacy Settings:
Administrators can control the visibility of requester information for technicians working on service requests. This helps balance transparency and data privacy within your Infraon Infinity platform.
Unmask Requester's Contact: This section provides a toggle button. Enabling this option grants technicians visibility to the requester's contact information, potentially including phone numbers. This can be beneficial for situations where direct contact with the requester might be necessary to resolve an issue.
Unmask Requester's Email: Another toggle button allows administrators to control the visibility of the requester's email address for technicians. Granting access to email addresses can facilitate direct communication between technicians and requesters, potentially expediting issue resolution.
Unmask Requester's Name: The final toggle button controls the visibility of the requester's name for technicians. Enabling this option ensures technicians can easily identify the person requesting assistance.
Report:
Define permission levels (Add, View, Edit, Delete, etc.) for different user roles regarding reports. This ensures users can access reports relevant to their needs while restricting access to sensitive data as necessary.
Once all the parameters are added, click 'Submit' to save and add the role. Administrators and privileged users can edit and delete roles using the respective icons.
Note: The 'Administrator' role cannot be cloned/edited/deleted.
Last updated