To secure control of your IT department's assets (that is, managed systems), Safeguard for Privileged Passwords uses a role-based access control hierarchy. Safeguard for Privileged Passwords's various permission sets restrict the amount of control each type of user has.
NOTE: It is the responsibility of a user with Authorizer Administrator permissions to grant administrator permissions to other Safeguard for Privileged Passwords users; however, the User Administrator can grant Help Desk Administrator permissions to non-administrative users.
Administrator permissions include:
The Appliance Administrator is responsible for configuring and maintaining the appliance, including the following tasks:
- Racks and stacks the appliance.
- Configures the appliance.
- (Optional) Sets up and uses the virtual appliance for initial setup, maintenance, backup, and recovery. For more information, see Using the virtual appliance and web management console.
- Troubleshoots performance, hardware, and networking.
- Creates and monitors the status of a clustered environment.
- Manages licenses, certificates, backups, and sessions settings.
- Enables and disables access request and password and SSH key management services.
An Asset Administrator manages all partitions, assets, and accounts:
- Creates (or imports) assets and accounts.
- Creates partitions and profiles.
-
Delegates partition ownership to users. A delegated partition owner has a subset of permissions that an Asset Administrator has. That is, the delegated partition owner is authorized to manage a specific partition and the assets and accounts assigned to that partition.
- Assigns assets to partitions.
-
Manages account password rules.
-
Manages ownership for assets, accounts, and partitions.
NOTE: Asset Administrators can only view the user object history for their own account.
The Auditor administrator has read-only access to all features, and has the ability to review all access request activity:
- Monitor appliance information
- Review everything
- Export object history
- Run entitlement reports
There are two additional permission types available once the Auditor role is selected that will help provide limited auditor permissions should you prefer not to use the all-encompassing Auditor role (which incorporates both permission types):
On some pages, it may appear the administrator can edit data, but the change cannot be saved. A message like the following will display: Authorization is required for this request.
Application Auditor
Application Auditor provides read-only access to features related to the functionality of Safeguard. The Application Auditor permissions correspond with the following roles, however only read-access is allowed:
System Auditor
System Auditor provides read-only access to features related to the operation of Safeguard. The System Auditor permissions correspond with the following roles, however only read-access is allowed:
-
Appliance
-
Operations
-
Help Desk
-
User
-
Global