Expand | ||||
---|---|---|---|---|
| ||||
|
Recommended Configuration Steps
...
Info |
---|
See the General Object Configuration |
...
guide for assistance configuring the General tab. |
Overview
The Role object is one part of the ACM security configuration. When user security is enabled (by enabling the option in the $Server object), the User objects and Role objects work together to define which :
- Which user or group accounts can connect to ACM
...
- Which configuration changes they are allowed to make
...
- Which commands they're allowed to execute.
The Security section of the User Guide has further explanations and examples of security configuration concepts.
Role Tab
Modify Object Privileges
Use this section to control whether user's of the users assigned this role have permission to make changes to the selected object types and properties. The permissions can be setup set up to allow access to specific properties and deny the rest, or to deny access to specific properties and allow the rest.
...
Use this section to control whether user's of the users assigned this role have permission to execute commands on the selected object types. The permissions can be setup set up to allow access to specific commands and deny the rest, or to deny access to specific commands and allow the rest.
...
Use this section to control whether user's of the users assigned this role have permission to create specific types of objects. The permissions can be setup set up to allow creation of specific object types and deny the rest, or to deny creation of specific object types and allow the rest.
...
Use this section to control whether user's of the users assigned this role have permission to delete specific types of objects. The permissions can be setup set up to allow deletion of specific object types and deny the rest, or to deny deletion of specific object types and allow the rest.
Configure Security
The Configure Security privilege allows users to create/modify/delete User and Role objects as well as enable/disable security.
Info |
---|
If the $Server "Windows administrators have full access" property is enabled, members of the Windows Administrators group will also be able to configure all objects including security objects. |