Camp Rubrik: Data Security Foundations
  • Camp Rubrik: Data Security Foundations
    • Lab environment
    • Welcome to Zaffre
      • Tools you will be leveraging
      • SLA driven policy engine
      • Role Based Access Control (RBAC)
      • In-place Recovery Plans
    • Identify and Recover from an attack
      • The attack
        • Navigate the two storefronts
        • Ransom note
      • Anomaly Detection
        • Accessing Anomaly Detection
        • Visibility into the attack
        • Investigations page
        • Determining blast radius
        • Instant file recovery
      • Threat Hunting
        • Identifying the entry point of an adversary
        • Building a threat hunt
        • Monitoring a threat hunt in progress
        • Review a completed hunt
      • Sensitive Data Monitoring
        • Accessing Sensitive Data Monitoring
        • Visibility into sensitive data
        • Cyber incident response
        • Business as usual
        • Policies
        • Analyzers
        • Custom analyzers & policies
        • Reporting
      • All Clear To Recover
      • Cyber Recovery
        • Accessing Cyber Recovery
        • Forensic Analysis
        • Recovery Plans
        • In-Place recovery
      • Data Security Command Center
        • Accessing Data Security Command Center
        • Platform Security
        • Anomaly Detection
        • Data Security Posture
        • Data Protection and Recovery
        • Multi-factor Authentication (MFA) with Time-based One-Time Passwords (TOTP)
      • Conclusion
Powered by GitBook
On this page
  • Create Roles and Users
  • Assign custom role to new user
  • Verify new role assignment
Export as PDF
  1. Camp Rubrik: Data Security Foundations
  2. Welcome to Zaffre

Role Based Access Control (RBAC)

PreviousSLA driven policy engineNextIn-place Recovery Plans

Last updated 1 year ago

It is important that you do not give admin privileges to all of the members of the team. Since a new junior administrator is joining your team, you can have a customized role for the new user and add privileges as you see fit.

Create Roles and Users

To get started:

  1. From the app tray, click on the gear icon.

NOTE: Clicking on the gear icon will open a new tab displaying the settings page.

  1. Navigate to the Settings page. Navigate to ROLES.

  1. Click CREATE ROLE.

  1. From the templates, select Custom role.

  1. Add a Role name, e.g. Demo. For the Data Management role card, select CONFIGURE.

  1. Select the radio button for By object type and click NEXT.

  1. Select vSphere as the Object type. Click edit icon for All protectable objects.

  1. Select Select specific vSphere objects radio button, and select haverford-dev, zaffre-dev and zaffre-test and click Done.

  1. Click NEXT.

  1. Click Select all existing and future SLA Domains and click Done.

  1. Click Create.

  1. Ensure that the new role is added under Roles.

Assign custom role to new user

Now, you can add a new local user and assign the new role.

  1. Click USERS and then click ADD LOCAL USER.

  1. Enter your email for adding the user so that you can access the email and continue with the new account login. Click NEXT.

  1. Select Demo as the Role and click ADD.

  1. Confirm that the new user is listed with the right role assignment under users.

Verify new role assignment

  1. From your email, click Continue.

  1. On the webpage, add a new password for the account.

NOTES:

  1. If you do not get the prompt for setting up the new password, then click on Reset password.

  2. Head back to your email, click on reset password, and set up the new password.

  1. Login with the new account and accept the terms and conditions as before.

  1. Navigate to Inventory > All > vSphere VMs.

You can only see 3 VMs for the new user with the demo role. This can be used to limit access to your environment.

  1. Now, log out of the demo account.

Login to RSC using the regular account credentials mentioned in the section.

lab environment