For example, you might give one user permission to edit policies and a different user permission to deploy policies. By distributing the editing and deployment rights between two users, you make it difficult for an unscrupulous user to create and deploy a harmful policy.
For even greater security, you could give user A edit rights, user B group rights, and user C deployment rights. This is more secure because anyone who has group rights can change a group so that it is an auto-deploy group, thus circumventing the lack of deployment permission.
Additionally, the operator lockdown feature allows you to prevent users from accessing any console functionality.
The table shows three user roles. Users 1 and 2 are assigned to role 1. User 3 is assigned to role 2, and user 4 is assigned to role 3.
Role | User | Category | Category-based Rights | Global Rights |
Role 1 | User 1 | a | Deploy | View Policy Management, Job Handling, Group Handling |
User 2 | b | Edit, Delete, Read | View Policy Management, Job Handling, Group Handling | |
Default | Read, Deploy | View Policy Management, Job Handling, Group Handling | ||
Role 2 | User 3 | Default | Read | View Policy Management |
Role 3 | User 4 | Default | / | / |