McAfee EPOCDE-AA-BA Product Guide - Page 47

Setting up permission sets, How users, groups, and permission sets fit together

Page 47 highlights

6 Setting up permission sets Permission sets control the level of access users have to the different features available in the software. Even the smallest of ePolicy Orchestrator installations needs to specify and control the access users have to different parts of the system. Contents How users, groups, and permission sets fit together Working with permission sets How users, groups, and permission sets fit together Access to items within ePolicy Orchestrator is controlled by interactions between users, groups, and permission sets. Users Users fall into two general categories. Either they are administrators, having full rights throughout the system, or they are regular users. Regular users can be assigned any number of permission sets to define their access levels within ePolicy Orchestrator. Groups Queries and reports are assigned to groups. Each group can be private (to that user only), globally public (or "shared"), or shared to one or more permission sets. Permission sets A particular access profile is defined within a permission set. This usually involves a combination of access levels to various parts of ePolicy Orchestrator. For example, a single permission set might grant the ability to read the Audit log, use public and shared dashboards, and create and edit public reports or queries. Permission sets can be assigned to individual users, or if you are using Active Directory, to all users from specific Active Directory servers. Putting the pieces together These three objects tightly interact. Understanding the interaction is the key to controlling access within ePolicy Orchestrator. Users do not have access to an object unless they are assigned a permission set that gives them that access. That same user does not have access to any reports or queries in a group unless the group is globally public or shared to a permission set assigned to that user. Due to the interwoven nature of these objects, you might have to create and modify permission sets, groups, and users multiple times to get everything set up the way you want. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328

6
Setting up permission sets
Permission sets control the level of access users have to the different features available in the software.
Even the smallest of ePolicy Orchestrator installations needs to specify and control the access users
have to different parts of the system.
Contents
How users, groups, and permission sets fit together
Working with permission sets
How users, groups, and permission sets fit together
Access to items within ePolicy Orchestrator is controlled by interactions between users, groups, and
permission sets.
Users
Users fall into two general categories. Either they are administrators, having full rights throughout the
system, or they are regular users. Regular users can be assigned any number of permission sets to
define their access levels within ePolicy Orchestrator.
Groups
Queries and reports are assigned to groups. Each group can be private (to that user only), globally
public (or "shared"), or shared to one or more permission sets.
Permission sets
A particular access profile is defined within a permission set. This usually involves a combination of
access levels to various parts of ePolicy Orchestrator. For example, a single permission set might grant
the ability to read the Audit log, use public and shared dashboards, and create and edit public reports
or queries.
Permission sets can be assigned to individual users, or if you are using Active Directory, to all users
from specific Active Directory servers.
Putting the pieces together
These three objects tightly interact. Understanding the interaction is the key to controlling access
within ePolicy Orchestrator. Users do not have access to an object unless they are assigned a
permission set that gives them that access. That same user does not have access to any reports or
queries in a group unless the group is globally public or shared to a permission set assigned to that user.
Due to the interwoven nature of these objects, you might have to create and modify permission sets,
groups, and users multiple times to get everything set up the way you want.
6
McAfee
®
ePolicy Orchestrator
®
4.6.0 Software Product Guide
47