vPlus 7.0
  • Welcome to vPlus!
  • Overview
    • Main Features
    • Support Matrix
    • Components and Architecture
    • Typical Scenarios
    • Licensing
    • Product Life Cycle
  • Deployment
    • Component Requirements
    • Supported Platforms Requirements
    • Sizing Guide
      • Small
      • Medium
      • Large
    • Installation
      • Quick Installation Using All-in-one Script
      • Installing vPlus Offline
      • Adding vPlus Nodes
    • Initial Configuration
    • Backup Destinations
      • File System
        • Synthetic File System
          • XFS
          • DD Boost
        • isoLayer (Synthetic)
        • File System
          • Virtual Data Optimizer (VDO)
        • Catalogic Software vStor
      • Deduplication Appliances
        • Huawei OceanProtect
        • HPE StoreOnce
        • Exagrid
        • Neverfail HybriStor
      • Object Storage
        • Alibaba Cloud OSS
        • AWS S3 or S3-compatible
        • Ceph Rados Gateway
        • Cloudian S3
        • Wasabi
        • Google Cloud Storage
        • IBM Cloud Object Storage
        • Microsoft Azure Blob Storage
        • Nutanix Objects
        • OpenStack SWIFT
        • Oracle Cloud Infrastructure Object Storage
        • Scality RING
      • Tape Pools
    • High Availability
      • 2 Node Cluster
      • 3 Node Cluster
    • Common Tasks
      • Staging Space Configuration
      • Enabling HTTPS Connectivity for Nodes
      • LVM Setup on vPlus Node for Disk Attachment Backup Mode
      • Full Versions of libvirt/qemu Packages Installation
      • SSH Public Key Authentication
      • Enabling HTTP(S) Proxy for vPlus
  • Protecting Virtual Environments
    • Virtual Machines
      • Nutanix Acropolis Hypervisor (AHV)
      • Red Hat Openshift Virtualization
      • Red Hat Virtualization
      • oVirt
      • Oracle Linux Virtualization Manager
      • Oracle VM
      • Proxmox VE
      • KVM/Xen
      • OpenStack
      • OpenNebula
      • Virtuozzo
      • Citrix Hypervisor (XenServer)
      • XCP-ng
      • Huawei FusionCompute
      • SC//Platform
    • Cloud
      • Amazon EC2
      • GCP GCE
      • Azure Cloud
    • Containers
      • Red Hat OpenShift
      • Proxmox VE
    • Backup & Restore
  • Protecting Microsoft 365
    • Microsoft 365 Organization Management
      • Configure Microsoft 365 Access
      • Add Microsoft 365 Organization Manually
      • Add Microsoft 365 Organization Using the Setup Assistant
      • Account Auto-synchronization
    • Backup & Restore
    • Suppoted Sharepoint Templates and Limitations
  • Protecting Applications
    • Applications
      • PostgreSQL
      • DB2
      • Relax and Recover - ReaR
      • Git
      • oVirt/RHV/OLVM
      • Kubernetes/OpenShift etcd
    • Backup & Restore
  • Protecting Storage Providers
    • Storage Providers
      • File System
      • Ceph RBD
      • Nutanix Files
      • Nutanix Volume Groups
    • Backup & Restore
  • Administration
    • Dashboard
    • Virtual Environments
      • Instances
        • Backup On-Demand
        • Restore On-Demand
        • Snapshot Management
      • Virtualization Providers
      • Backup SLAs
        • Policies
        • Schedules
      • Snapshot SLAs
        • Policies
        • Schedules
      • Recovery Plans
        • Policies
        • Schedules
      • Mounted Backups (File-level Restore)
    • Storage
      • Instances
        • Backup On-Demand
        • Restore On-Demand
      • Infrastructure
      • Backup SLAs
        • Policies
        • Schedules
      • Snapshot SLAs
        • Policies
        • Schedules
      • Mounted Backups (File-level Restore)
    • Microsoft 365
      • Instances
      • Organizations
      • Backup SLAs
        • Policies
        • Schedules
      • Download
    • Applications
      • Instances
      • Execution Configurations
      • Backup SLAs
    • Reporting
      • Virtual Environments
      • Storage
      • Microsoft 365
      • Applications
      • Notifications
      • Audit Log
    • Nodes
      • Instances
      • Node Configurations
    • Access Management
      • Users
      • Groups
      • Roles
      • OS Credentials
    • Settings
      • Global Settings
      • Internal DB Backup
      • Notification Rules
      • Mailing Lists
      • Endpoints Global Settings
    • Upgrade
    • CLI Reference
    • CLI v2 Reference (technical preview)
  • Integration
  • Troubleshooting
    • How to Enable vPlus DEBUG Mode
    • Collecting Logs
    • External Log Targets
    • Disaster Recovery
  • Known Software Issues and Limitations
  • Glossary
Powered by GitBook
On this page
  • Permissions
  • Security contexts
  1. Administration
  2. Access Management

Roles

The Role is a set of permissions to the different sections and actions in vPlus. When multiple roles are assigned to the Group, the resulting permissions will be the sum of all permissions from all assigned roles.

Note.

  • It is mandatory to have always at least one account with permission to manage Users

  • in other words: at least one account must be assigned to the group, which has a role with this permission.

Permissions

Section (Name)
Permission
Allows

Nodes

Instances

Read - allows you to view the list of instances and basic information Register - allows you to register new nodes in the environment

Write - allows you to change selected node config

Delete - allows you to remove a node from the environment

Nodes

Node Configurations

Read - allows you to browse the list of configs and open them

Write - allows you to modify existing configs and create new ones

Virtual Environments

Instances

Read - allows you to browse the list of instances and open them

Write - allows you to modify virtual machine settings

Backup - allows you to perform a manual backup

Restore - allows you to perform a manual restore

Snapshot - allows you to perform a manual snapshot

Mount - allows you to mount a backup for file-level restore

Clean old Snapshot - allows you to perform the "Clean old snapshot" task

Virtual Environments

Infrastructure

Read - allows you to browse the list of infrastructure objects for all tabs

Write - allows you to modify settings for existing objects and to add new ones

Test Connectivity - This permission allows you to enable or disable access to the connectivity test

Virtual Environments

Backup SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Virtual Environments

Snapshot SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Virtual Environments

Recovery Plans

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Virtual Environments

Mounted Backups

Read - allows you to browse the list of mounted backups and also to download files

Unmount - allows you to unmount a backup

Applications

Instances

Read - allows you to browse the list of instances and open them

Write - allows you to modify virtual machine settings

Backup - allows you to perform a manual backup

Restore - allows you to perform a manual restore

Applications

Execution Configurations

Read - allows you to browse the list of execution configs

Write - allows you to modify the existing and add new ones

Applications

Backup SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Storage

Instances

Read - allows you to browse the list of instances and open them

Write - allows you to modify storage instance settings

Backup - allows you to perform a manual backup

Restore - allows you to perform a manual restore

Snapshot - allows you to perform a manual snapshot

Mount - allows you to mount a backup for file-level restore

Clean old Snapshot - allows you to perform the "Clean old snapshot" task

Storage

Infrastructure

Read - allows you to browse the list of infrastructure objects for all tabs

Write - allows you to modify settings for existing objects and to add new ones

Test Connectivity - This permission allows you to enable or disable access to the connectivity test

Storage

Backup SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Storage

Snapshot SLAs

Read - allows you to browse the list of policies and schedules

Write - allows you to modify the existing and add new ones

Storage

Mounted Backups

Read - allows you to browse the list of mounted backups and also to download files

Unmount - allows you to unmount a backup

Reporting

Reporting

Read - allows you to view report data for virtual machines and storage providers Send report - This permission allows you to enable or disable the ability to send the report by mail

Reporting

Audit Log

Read - This permission allows you to enable or disable access to the audit log report

Backup Destinations

Backup Destination

Read - allows you to browse the list of backup destinations

Write - allows you to modify settings for existing objects and to add new ones

Test Connectivity - This permission allows you to enable or disable access to the connectivity test

Clean old backups - This permission allows you to enable or disable the ability to perform this task

Access Management

Access Management

Read - allows you to browse the list of objects for all access management tabs

Write - allows you to modify existing objects and to add new ones

Change passwords - allows you to change user passwords

Settings

Settings

Read - allows you to view selected settings for all tabs in the "settings" section

Write - allows you to modify settings for all tabs in the "settings" section

Tasks Console

Tasks Console

Read - this permission allows you to hide or show the "Task Console" floating panel

Write - allows you to remove/cancel tasks from the list

Restore Job

Restore Job

Read - This permission allows you to enable or disable access to the information about restore tasks - under tasks console, details of virtual machine or storage instance and from recovery plans

Security contexts

The security context defines the set of system objects that can be accessed with defined permissions.

The object hierarchy is constructed in a way that any defined privileges will apply to the specified object and to all the downstream objects, therefore the System Level security context defines the access to all objects across the platform and disables the choice of lower-level objects.

Security contexts have been aggregated into the specified hierarchy. Different system object types can have different parental objects (or none) and so will appear in the different sections of the tree.

Selected objects will be visible in the table on the right-hand side.

The full hierarchy:

  • Hypervisor Managers

    • Projects

      • Virtual Environments

    • Data Centers

      • Hypervisors

        • Virtual Environments

      • Clusters

        • Hypervisors

        • Virtual Environments

      • Virtual Environments

    • Clusters

      • Hypervisors

      • Virtual Environments

    • Hypervisors

      • Virtual Environments

    • Virtual Environments

  • Hypervisors

    • Virtual Environments

  • Application Configurations

    • Applications

  • Storage Providers

    • Storages

PreviousGroupsNextOS Credentials