• Active Directory
  • Application
  • Desktop & Mobile
  • Help Desk
  • Network
  • Server
  • IT Security
  • MSP
  • On-Demand
 
 
Device Management, made easy
Manage control and secure your workstations, mobile
devices and tablets
 
 
Help Desk for Everyone
IT Help Desk Software and Customer Support Software
 
 
Protect Your IT. Save Your Business
Build a secure fortress with our security management solutions
 
 
MSP
Manage services faster, with multi-tenanted, ITIL-ready, and unified RMM solutions
 
 
On-Demand Solutions
IT Help Desk, Active Directory, and Operations Management from the Cloud
 

Role based access Control

Existing Security Concerns

With support for a wide range of vendor network devices out-of-the-box, OpManager makes a hassle-free deployment to get an universal performance and health outlook across your network gears viz. router, switches, firewalls, VPN concentrators, WAN accelerators, Wifi devices and their interface or switch port traffic.

The configurations of different devices in IT360 (servers, applications, network devices, storage devices) are crucial from the network security standpoint. These configurations contain sensitive information such as access credentials, SNMP settings and Access control list. Moreover, in multi-member work environments, like IT360, network administrators often have to access and deploy configuration changes to devices in production. This requires:

  • collaboration among the administrators
  • consistency in rolling out configuration changes

This means, all administrators get access to all the devices and deploy configuration changes manually, as per their own style and preferences. So, in the absence of collaboration and consistency, this manual approach might lead to security vulnerabilities. Hence, relying on manual processes for device configuration management won’t be prolific in any way

Role based access in IT360

IT360 implements the role-based access control feature that helps control access to various modules of IT360 (Servers & Applications, Networks, Storage and Traffic).

Roles can be grouped into different categories like Administrators, Operators, Guests, etc; by configuring only those devices they have been provided with. IT360 acts as the centralized interface from where the administrators can control the configurations of different modules

Design

IT360 allows different types of roles to be created and then different users to be associated with those roles. It offers a number of predefined roles, and permits you to create your own custom roles, as well.

IT360 comes with the following pre-defined access levels (Roles):

Roles Description of the Role
Administrator Role With privileges to assign user to have unlimited administrative access to all the network devices, applications, servers and bandwidth monitors configured inside IT360. He has complete access over Networks, Servers, Applications and Traffic modules of IT360. When logged into ServiceDesk, the role assigned is that of a Technician.
Guest Role With guest access, i.e. Read Only access, to all the modules of IT360 with Requestor Role in ServiceDesk.
Network Administrator With privileges to have unlimited administrative access to all the network devices and bandwidth monitors configured inside IT360. He has complete access over Networks and Traffic modules of IT360. When logged into ServiceDesk, the role assigned is that of a Technician.
Network Operator With privileges to assign user to have restricted access to all the network devices and bandwidth monitors configured inside IT360 as assigned by Admin. He has access over Networks and Traffic modules of IT360. When logged into ServiceDesk, the role assigned is that of a Technician.
System and Applications Administrator With privileges to assign user to have unlimited administrative access to all the servers and application monitors configured inside IT360. He has complete access over Servers and Applications modules of IT360. When logged into ServiceDesk, the role assigned is that of a Technician.
System Operator With privileges to assign user to have restricted access to all the network devices, servers and application monitors configured inside IT360 as assigned by Admin. He has access over Networks, Servers and Applications modules of IT360. When logged into ServiceDesk, the role assigned is that of a Technician.
IT Administrator With privileges to assign user to have unlimited administrative access to all the network devices, applications, servers and bandwidth monitors configured inside IT360. He has complete access over Networks, Servers, Applications and Traffic modules of IT360. When logged into ServiceDesk, the role assigned is that of a TechnicianReporterPOApprover and ChangeManager.
Operator Role With privileges to assign user to have limited administrative access to the various modules (Networks, Servers, Applications, Traffic) inside IT360. The role allows the user to view specific components/business service as assigned by Admin. When logged into ServiceDesk the role assigned is that of a Requestor.
Helpdesk Technician Click here to know about HelpDesk Technician [this Role is applicable to Professional Edition and Central Server of Enterprise Edition alone]
Helpdesk Requestor Click here to know about HelpDesk Requestor [this Role is applicable to Professional Edition and Central Server of Enterprise Edition alone]

Once the roles are created, they get listed under roles view as shown below:

Now, users can be associated with any of the above roles.

Consider an example of creating a User with the Role: System and Applications Administrator. If you login using the credentials of this user, then he will have unlimited administrative access only to the Servers and Applications modules of IT360. Others modules (Networks & Storage), will not be visible to him. Refer the below figure:

Integrated IT Management Solution trusted by