Previous Topic: How to Create a Scoped AdministratorNext Topic: How to Create a Legacy Administrator


Administrator Use Cases

This administrator use case illustrates the following situations:

This scenario involves three administrators.

Using the three administrators, the following scenarios are described:

The following terms are used throughout the use case:

Access Method

Specifies how an administrator interacts with the Policy Server.

Security Category

Specifies a functional area in which an administrator can execute tasks to manage Policy Server objects or tools.

Scope

Indicates whether administrator privileges extend to all policy objects or a subset of objects that are defined in an assigned workspace.

Permissions

Determines the tasks that an administrator performs relative to a security category. Such as read, manage, propagate, or execute tasks.

Rights

Defines the complete set of privileges for the administrator. Rights are based on the security category, scope, and permissions.

Superuser Creates Manager Admin

The superuser is the administrator that was delegated system privileges when the connection to the external administrator user store was configured. The superuser can assign all categories, rights, and scope to any other Administrator.

From the Administrative UI, the superuser creates an administrator that is named Manager Admin. Initially, Manager Admin has no privileges until the superuser assigns them.

The superuser assigns the following privileges to Manager Admin:

Access Method

GUI Allowed

Rights

Security Category

Permissions*

Agent Administration

V, M

Application Administration

V, M, P

Policy Administration

V, M, P

* Permissions: View, Manage, Propagate, eXecute (only for executing reports)

Note: The Propagate permission allows one manager to assign the category to another administrator.

If Manager Admin logs in to the Administrative UI, they can view and modify all agents, applications, and domains in the policy store. If they create an administrator account, they can assign only Application Administration and Policy Administration security categories to that account.

Superuser Creates a Workspace and Assigns it to Scope Manager Admin

The superuser wants to limit the scope of Manager Admin so that they can only manage a subset of policy data. The superuser first creates a workspace that is named Workspace1 with the following members:

Type

Name

Agent

Agent1

Application

Application1

Application

Application2

Domain

DomainB

The superuser then edits the Administrator record for Manager Admin to assign Workspace1.

At this stage, if Manager Admin logs in they can now only view and modify Agent1, Application1, Application2, and policies in DomainB. Other agents, applications, and domains in the policy store do not appear in the Administrative UI.

Manager Admin Creates Junior Admin

The second part of this use case shows how an administrator with a specific set of privileges creates another administrator.

Manager Admin creates an administrator that is named Junior Admin. When Manager Admin goes to add security categories for Junior Admin, only the following items (for which Manager Admin has the propagate permission) are available:

Note: The propagate permission lets one administrator assign the category to another administrator.

Manager Admin proceeds to assign access methods and rights to Junior Admin as follows:

Access Method

GUI Allowed

Rights

Security Category

Permissions*

Application Administration

V

Policy Administration

V, M

* Permissions: View, Manage, Propagate, eXecute (only for executing reports)

At this stage, if Junior Admin logs in to the Administrative UI, they can view Application1 and Application2. They can view and modify DomainB (limited by default to the scope of Manager Admin).

Manager Admin Creates a Workspace and Assigns it to Further Scope Junior Admin

Manager Admin wants to limit the scope of Junior Admin so that they can only manage a smaller subset of policy data. To do this, Manager Admin first creates a workspace that is named Workspace2 with the following members:

Type

Name

Application

Application2

Domain

DomainB

Manager Admin then edits the Administrator record for Junior Admin to assign Workspace2.

At this stage, if Manager Admin logs in they can now only view Application2, and view and modify policies in DomainB. Other applications and domains in the policy store do not appear in the Administrative UI.