Roles
The Role is a set of permissions to the different sections and actions in vPlus. When multiple roles are assigned to the Group, the resulting permissions will be the sum of all permissions from all assigned roles.
Note.
It is mandatory to have always at least one account with permission to manage Users
in other words: at least one account must be assigned to the group, which has a role with this permission.
Permissions
Section (Name) | Permission | Allows |
---|---|---|
Nodes | Instances | Read - allows you to view the list of instances and basic information Register - allows you to register new nodes in the environment Write - allows you to change selected node config Delete - allows you to remove a node from the environment |
Nodes | Node Configurations | Read - allows you to browse the list of configs and open them Write - allows you to modify existing configs and create new ones |
Virtual Environments | Instances | Read - allows you to browse the list of instances and open them Write - allows you to modify virtual machine settings Backup - allows you to perform a manual backup Restore - allows you to perform a manual restore Snapshot - allows you to perform a manual snapshot Mount - allows you to mount a backup for file-level restore Clean old Snapshot - allows you to perform the "Clean old snapshot" task |
Virtual Environments | Infrastructure | Read - allows you to browse the list of infrastructure objects for all tabs Write - allows you to modify settings for existing objects and to add new ones Test Connectivity - This permission allows you to enable or disable access to the connectivity test |
Virtual Environments | Backup SLAs | Read - allows you to browse the list of policies and schedules Write - allows you to modify the existing and add new ones |
Virtual Environments | Snapshot SLAs | Read - allows you to browse the list of policies and schedules Write - allows you to modify the existing and add new ones |
Virtual Environments | Recovery Plans | Read - allows you to browse the list of policies and schedules Write - allows you to modify the existing and add new ones |
Virtual Environments | Mounted Backups | Read - allows you to browse the list of mounted backups and also to download files Unmount - allows you to unmount a backup |
Applications | Instances | Read - allows you to browse the list of instances and open them Write - allows you to modify virtual machine settings Backup - allows you to perform a manual backup Restore - allows you to perform a manual restore |
Applications | Execution Configurations | Read - allows you to browse the list of execution configs Write - allows you to modify the existing and add new ones |
Applications | Backup SLAs | Read - allows you to browse the list of policies and schedules Write - allows you to modify the existing and add new ones |
Storage | Instances | Read - allows you to browse the list of instances and open them Write - allows you to modify storage instance settings Backup - allows you to perform a manual backup Restore - allows you to perform a manual restore Snapshot - allows you to perform a manual snapshot Mount - allows you to mount a backup for file-level restore Clean old Snapshot - allows you to perform the "Clean old snapshot" task |
Storage | Infrastructure | Read - allows you to browse the list of infrastructure objects for all tabs Write - allows you to modify settings for existing objects and to add new ones Test Connectivity - This permission allows you to enable or disable access to the connectivity test |
Storage | Backup SLAs | Read - allows you to browse the list of policies and schedules Write - allows you to modify the existing and add new ones |
Storage | Snapshot SLAs | Read - allows you to browse the list of policies and schedules Write - allows you to modify the existing and add new ones |
Storage | Mounted Backups | Read - allows you to browse the list of mounted backups and also to download files Unmount - allows you to unmount a backup |
Reporting | Reporting | Read - allows you to view report data for virtual machines and storage providers Send report - This permission allows you to enable or disable the ability to send the report by mail |
Reporting | Audit Log | Read - This permission allows you to enable or disable access to the audit log report |
Backup Destinations | Backup Destination | Read - allows you to browse the list of backup destinations Write - allows you to modify settings for existing objects and to add new ones Test Connectivity - This permission allows you to enable or disable access to the connectivity test Clean old backups - This permission allows you to enable or disable the ability to perform this task |
Access Management | Access Management | Read - allows you to browse the list of objects for all access management tabs Write - allows you to modify existing objects and to add new ones Change passwords - allows you to change user passwords |
Settings | Settings | Read - allows you to view selected settings for all tabs in the "settings" section Write - allows you to modify settings for all tabs in the "settings" section |
Tasks Console | Tasks Console | Read - this permission allows you to hide or show the "Task Console" floating panel Write - allows you to remove/cancel tasks from the list |
Restore Job | Restore Job | Read - This permission allows you to enable or disable access to the information about restore tasks - under tasks console, details of virtual machine or storage instance and from recovery plans |
Security contexts
The security context defines the set of system objects that can be accessed with defined permissions.
The object hierarchy is constructed in a way that any defined privileges will apply to the specified object and to all the downstream objects, therefore the System Level
security context defines the access to all objects across the platform and disables the choice of lower-level objects.
Security contexts have been aggregated into the specified hierarchy. Different system object types can have different parental objects (or none) and so will appear in the different sections of the tree.
Selected objects will be visible in the table on the right-hand side.
The full hierarchy:
Hypervisor Managers
Projects
Virtual Environments
Data Centers
Hypervisors
Virtual Environments
Clusters
Hypervisors
Virtual Environments
Virtual Environments
Clusters
Hypervisors
Virtual Environments
Hypervisors
Virtual Environments
Virtual Environments
Hypervisors
Virtual Environments
Application Configurations
Applications
Storage Providers
Storages
Last updated