Managing user roles and permissions

Prev Next

Users can perform various operations based on the roles assigned to them.  Secure Edge offers two default roles: Admin and Read Only. Admin users can add, edit, and delete configurations, while Read Only users can view them. Assign roles based on responsibilities, and create custom roles as needed for specific functions within network, organization, service, and user management.

Roles and associated user operations

The following table lists some of the operations associated with default and custom roles in the Secure Edge Portal.

ComponentAdminRead Only
NetworkAdd/delete network
View/edit network
Connect/disconnect network
View network
NodeAdd/delete node
Edit node
Collect diagnostic data
View node details
OrgCreate child org
Create user and roles
View org details
RoleAdd/view rolesView roles
ServiceInstall services
Delete services
View service logs
View service
UserView/edit user
Add/delete user
View list of all users

Default roles and associated permissions

The following table lists the default roles and their associated permission names.

Default rolePermissions
Read OnlyNODE:READ, NETWORK:READ, SERVICE:READ, ORG:READ, USER:READ, ROLE:READ
AdminNODE:ADMIN, NODE:READ, NODE:REBOOT, NETWORK:READ, NETWORK:ADMIN, NETWORK:CONNECT_DISCONNECT, NETWORK:DIAGNOSTIC, SERVICE:ADMIN, SERVICE:READ, ORG:ADMIN, ORG:READ, USER:ADMIN, USER:READ, ROLE:ADMIN, ROLE:READ, PKI:ADMIN, EVENT:DOWNLOAD, EVENT:VIEW, ACTIVITY:DOWNLOAD, ACTIVITY:VIEW

Available permissions

The following table lists all available permissions. On the Roles page, in the Permissions field, you can hover over any permission name for a quick description of its access level(s).

PermissionDescription
NODE:READAllows read access to all clusters, nodes, networks, services, service template, profiles (config template), techdump, ssh public keys, PKI, node and service statistics view, node upgrade history and container image under the respective namespace, node CLI, monitoring, and duplicate address detection (DAD).
NODE:ADMINAllows administrator access to all nodes, networks, services, service template, profiles (config template), techdump, node upgrade history and container image, and node and service statistics view.
Also allows read access to PKI under the respective namespace, cluster management, node CLI, monitoring, DAD, and representation network automation.
NODE:REBOOTAllows reboot and node service statistics view access to all nodes under the respective namespace.
NETWORK:READAllows read access to all networks and vinet under the respective namespace.
NETWORK:ADMINAllows administrator access to all networks and vinet under the respective namespace.
NETWORK:CONNECT_DISCONNECTAllows connect and disconnect access to all networks under the respective namespace.
NETWORK:DIAGNOSTICAllows read access to all nodes’ techdump under the respective namespace.
SERVICE:READAllows read access to all services and secrets under the respective namespace.
SERVICE:ADMINAllows administrator access to all services and secrets under the respective namespace.
ORG:READAllows read access to organization, user, role, ssh public keys, and permission(s).
ORG:ADMINAllows access to the following functions: create a new organization, user, and role; create/update organization policy, reset two-factor authentication (2FA), initiate verify email, assign certificates to organization under the respective namespace, manage public keys, manage SSH access on nodes and administrator access to API key, access events at organization and node level, and access notification channels.
USER:READAllows read access to users’ roles under the respective namespace.
USER:ADMINAllows administrator access to users and roles, initiate verify user email, and create/get API key under the respective namespace.
ROLE:READAllows read access to roles under the respective namespace.
ROLE:ADMINAllows administrator access to roles under the respective namespace.
PKI:ADMINAllows administrator access to PKI (public key
infrastructure).
EVENT:DOWNLOADAllows access to download event logs.
EVENT:VIEWAllows access to view organization and node
level events.
ACTIVITY:DOWNLOADAllows access to download activity logs.
ACTIVITY:VIEWAllows access to view activity logs

Create user-defined roles

To create a user-defined role, follow these steps:

  1. Log in to Secure Edge Portal with Admin access.
  2. From the left menu, select Users > All Roles.
  3. In the top right, select the plus sign icon (+) to add a new role.
  4. Enter the role name, a Description, and select the necessary permissions. (Hover over any permission to see a quick description.)
    Add Role window that has fields for Role Name, Description, and Permissions
  5. Select + Add Role.

Assign a user-defined role

To assign a user-defined role for a new user, follow these steps:

  1. Log in to Secure Edge Portal with Admin access. 
  2. From the top of the left menu, select the plus sign icon (+) > Add User.
  3. Enter the user details and select the role to assign this user.
    add-user
  4. Select Add User.

To verify the role has the permissions you intended, log in as the user and confirm the appropriate operations are available.

View and edit roles

Admins can view roles and edit the permissions applied to a custom role.

Note
Default roles cannot be edited.
  1. From the portal's left menu, select Users > All Roles.
  2. On the Roles page, in the left column. Select any role name to view its description and permissions.
    Example role line item for PKIADMIN role that shows its associated permissions
  3. To edit the role, click the menu to the right (three vertical dots) and the select the Edit (pencil) icon.
  4. Modify the desired fields. (Hover over any permission to see a quick description.)
    Edit Role window showing how you can modify the permissions (items) for the example PKIADMIN role
  5. Select Update to save the changes.