Role Based Access Control (RBAC)
Last updated
Last updated
It is important that you do not give admin privileges to all of the members of the team. Since a new junior administrator is joining your team, you can have a customized role for the new user and add privileges as you see fit.
To get started:
From the app tray, click on the gear icon.
NOTE: Clicking on the gear icon will open a new tab displaying the settings page.
Navigate to the Settings page. Navigate to ROLES.
Click CREATE ROLE.
From the templates, select Custom role.
Add a Role name, e.g. Demo. For the Data Management role card, select CONFIGURE.
Select the radio button for By object type and click NEXT.
Select vSphere as the Object type. Click edit icon for All protectable objects.
Select Select specific vSphere objects radio button, and select haverford-dev, zaffre-dev and zaffre-test and click Done.
Click NEXT.
Click Select all existing and future SLA Domains and click Done.
Click Create.
Ensure that the new role is added under Roles.
Now, you can add a new local user and assign the new role.
Click USERS and then click ADD LOCAL USER.
Enter your email for adding the user so that you can access the email and continue with the new account login. Click NEXT.
Select Demo as the Role and click ADD.
Confirm that the new user is listed with the right role assignment under users.
From your email, click Continue.
On the webpage, add a new password for the account.
NOTES:
If you do not get the prompt for setting up the new password, then click on Reset password.
Head back to your email, click on reset password, and set up the new password.
Login with the new account and accept the terms and conditions as before.
Navigate to Inventory > All > vSphere VMs.
You can only see 3 VMs for the new user with the demo role. This can be used to limit access to your environment.
Now, log out of the demo account.
Login to RSC using the regular account credentials mentioned in the lab environment section.