Roles & Privileges

Access control within Infraon is managed through role-based privileges. A Role defines a user's role within Infraon, and Privileges define the user's level of access across multiple modules of Infraon. Infraon comes with seven default roles with pre-defined privileges.

What you see on the screen

On Infraon, multiple default roles are displayed as a list with icons for editing, cloning, and deleting. The 'New Role' button is at the top right corner of the page.

Details displayed are as follows:

  • Role Name

  • User Count

  • Role Description

  • Icons to edit/clone/delete

Roles

While Infraon comes with seven default roles, you can edit an existing role's privileges and add a new one to suit your needs.

Role

Description

Requester

Are end-users who have access only to the requester portal from where they can raise incidents, service & change requests and go through the complete Knowledge Base?

Tech Support Operator

Are users part of the technical support team that provides technical support to end-users/requesters?

A Technical Support Operator can access Service Catalog, Workflow, Assets, user Dashboards, and Reports. A Tech Support Operator also has privileges to add and edit Incidents.

Tech Support Manager

Are users with privileges of a Requester + Tech support operator + admin privileges to manage the assigned team?

By default, a Tech Support Manager has privileges to add Fixed Assets, add/edit/delete Tech Support Operators, add/edit/delete Incidents, Dashboards, and Reports.

NOC Operator

Are users assigned to monitor the organization's network and have all the privileges of Tech Support operators?

By default, a NOC Operator has complete privileges over Alarms, Events, and Notifications.

IT Support Operator

Are users assigned to monitor and provide IT infrastructure-related support?

By default, an IT Support operator has privileges to add /edit Discovery Profiles, add/edit assets through Discovery/CSV (on approval), and complete privileges over Alarms, Monitoring Dashboards*, Monitoring Reports*, and Notifications.

Administrator

Are users with complete access across all modules of Infraon

Note: The 'Administrator' role cannot be cloned/edited/deleted.

*Monitoring Dashboards and reports are those dashboards/reports assigned to the user to enable monitoring.

Instructions to 'Add a new Role.'

  • Go to Infraon Configuration -> User Management -> Role and Privileges

  • Click on the 'New Role' button in the top right corner.

Privileges for default roles are saved as templates and can be selected and customized to suit needs. Privileges are customized at the ‘General,’ ‘Ticket,’ ‘NCCM,’ ‘Privacy Settings,’ and ‘Reports’ levels.

Label

Action

Description/Example

Role Name*

Add a name for the new role.

Manager, Support Team, L1 Support, etc.,

Select Template

Select a template to import privileges.

Selecting existing role templates helps import privileges from an existing role to the new role.

Description

Add a brief description of the role.

Assign to L1 support members of the team.

Privileges

Select privileges to enable access to the new role.

Privileges are split into modules: General, Ticket, NCCM, Privacy Settings, and Reports.

Permissions can be explicitly selected - view, add, edit, delete, copy, and configure.

Privileges

The Privileges module within Infraon Infinity empowers administrators with granular control over user permissions. This ensures users have the necessary access to perform their tasks effectively while safeguarding sensitive data within the platform.

Here, admins can define specific actions/modules that users can perform within each module using checkboxes. These levels include:

Label

Action

Description/Example

View

If selected, the 'View' privilege allows the user only to view the selected module/page.

For example, if the user is given the 'View' privilege to the 'Business Catalogue' module, the user will be able to view the services listed.

Add

If selected, 'Add' allows the user to view and perform add operations within the selected module/page.

For example, if the user is given the 'Add' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and add new services. The user will, however, not have edit or delete privileges.

Edit

If selected, 'Edit' allows the user to view and perform edit operations within the selected module/page.

For example, if the user is given the 'Edit' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and edit existing services. The user will, however, not have add or delete privileges.

Delete

If selected, 'Delete' allows the user to view and perform add operations within the selected module/page.

For example, if the user is given the 'Delete' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and delete existing services. The user will, however, not have to add or edit privileges.

Copy

If selected, 'Copy' allows the user to view and perform add operations within the selected module/page.

For example, if the user is given the 'Copy' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and add new services. The user will, however, not have edit or delete privileges.

Configure

If selected, 'Configure' allows the user to view and perform add operations within the selected module/page.

For example, if the user is given the 'Add' privilege to the 'Business Catalogue' module, the user will be able to view the services listed and add new services. The user will, however, not have edit or delete privileges.

Upload

If selected, ‘Upload' allows the user to view and perform add operations within the selected module/page

Download

If selected, ‘Download’ allows users to download and perform export operations within the selected module/page.

The Download privilege allows users to export logs from the Log Management module in PDF, CSV, or XLS formats, enabling offline analysis, sharing, and integration with other tools.

Here's a breakdown of the functionalities offered by the Privileges module and its sub-modules:

General:

Grant access to various Infraon Infinity modules:

  • Agent

  • API Registration

  • Audit

  • Business Hour

  • Bot Configuration

  • Business Rule

  • Business Catalogue

  • Change

  • CI Relation rule

  • Asset

  • Contract Management

  • Correlation Rule

  • CSAT

  • Client Registration

  • Dashboard

  • Department

  • Device Credentials

  • Diagnosis Tools

  • Discovery

  • Events

  • Geomap

  • Holiday

  • IMACD

  • Mail Automator

  • Jobs

  • Knowledge Base

  • Leaves

  • Maintenance

  • Messenger

  • My Profile

  • Network Configuration

  • Network Diagram

  • Organization

  • Address Book

  • Password Policy

  • Problem

  • Release

  • Request

  • Requester

  • Service Catalogue

  • Shift

  • SLA

  • SMS Gateway

  • Software License

  • SSP Configuration

  • Tag

  • Task

  • Team Escalation

  • Teams

  • Template

  • Thresholds

  • Topology

  • Trigger

  • Technician

  • Role

  • Vendor

  • Workflow

  • Workspace

Log Management:

Manage user access to functionalities related to Log Management and configurations. This sub-module offers permissions for:

  • Log Multi-Index: Create and manage the multi-indexes that help retrieve data from Elasticsearch.

  • Log Export Configs: Export Configs define how logs are exported, including format, size, and downloaded exported log files.

  • Log Search: Enables rapid searching and analysis of vast amounts of structured and unstructured log data, delivering results in seconds.

  • Log Rule: A critical component in monitoring systems that defines how log data is processed and analyzed in real-time to quickly detect and respond to security threats.

Ticket:

Define permission levels (Add, View, Edit, Delete, etc.) for different user roles regarding ticket management tasks. This allows for granular control over how users interact with tickets within the system.

NCCM (Network Change & Configuration Management):

Manage user access to functionalities related to network changes and configurations. This sub-module offers permissions for:

  • Baseline Scheduler: Control access to scheduling tasks for network baseline configuration.

  • Configuration Download Job: Manage permissions for initiating downloads of network configuration data.

  • Configuration Parameters: Define user access to view or modify network configuration parameters.

  • Configuration Profiles: A configuration profile is a template or predefined set of configuration settings that network administrators can create and customize configuration profiles with information like device details and connection protocols for SSH and Telnet.

  • Configuration Search: Configuration Search specifically focuses on download jobs, allowing users to view or export the "startup" or "running" configurations within these jobs to identify any configuration.

  • Configuration template: Configuration templates hold the commands for uploading jobs and making changes to network devices, including provisioning, OS upgrades, creating or deactivating services, and any other change.

  • OS Image: OS images are used primarily for managing and deploying configuration changes across network devices such as routers, switches, and firewalls.

Privacy Settings:

Administrators can control the visibility of requester information for technicians working on service requests. This helps balance transparency and data privacy within your Infraon Infinity platform.

  • Unmask Requester's Contact: This section provides a toggle button. Enabling this option grants technicians visibility to the requester's contact information, potentially including phone numbers. This can be beneficial for situations where direct contact with the requester might be necessary to resolve an issue.

  • Unmask Requester's Email: Another toggle button allows administrators to control the visibility of the requester's email address for technicians. Granting access to email addresses can facilitate direct communication between technicians and requesters, potentially expediting issue resolution.

  • Unmask Requester's Name: The final toggle button controls the visibility of the requester's name for technicians. Enabling this option ensures technicians can easily identify the person requesting assistance.

Report:

Define permission levels (Add, View, Edit, Delete, etc.) for different user roles regarding reports. This ensures users can access reports relevant to their needs while restricting access to sensitive data as necessary.

Once all the parameters are added, click 'Submit' to save and add the role. Administrators and privileged users can edit and delete roles using the respective icons.

Note: The 'Administrator' role cannot be cloned/edited/deleted.

Last updated