Applies To:
Show VersionsEnterprise Manager
- 3.1.1
About authentication and permissions for Enterprise Manager user roles
A user role specifies the type of management tasks that an Enterprise Manager user can perform on managed devices in your network. Permissions for user roles are classified as either non-restricted or restricted. The user roles are defined as:
- Administrator
- This (non-restricted) role can perform all management functions available to Enterprise Manager, including managing other user accounts and roles.
- Operator and Application Editor
- By default, these (restricted) roles perform fewer management tasks than the Administrator. You can customize each role by specifying the tasks that the role is allowed to perform.
Users are authenticated through Enterprise Manager's local database.
User role permissions and management tasks
There are eight different types of permissions that you can specify for each restricted user role. You can specify any of these management task permissions to the Operator and Application Editor user roles.
Permission | Management task |
---|---|
Manage Device Configuration Archives | Create and manage UCS archives for all managed devices |
Browse Device Configurations | View configurations from the Enterprise Manager configuration browser |
Compare Device Configuration Archives | Compare UCS configuration files between two devices |
Stage Changesets for Deployment from Published Templates | Create a new staged changeset from a published template |
Deploy Staged Changesets | Deploy a staged changeset created by a user |
Administer Device Lists | Manage device list members |
Synchronize Device Configuration with Peer | Synchronize peer device configurations |
Failover Devices | Initiate a failover to a peer managed device |
Adding new users to perform management tasks on Enterprise Manager
All users and their privileges are displayed on the User list screen.
Changing source for authenticating users
Customizing user role permissions
- On the Main tab, click .
- For each restricted user role, select or clear the check box next to the permission you want to modify.
- Click Apply to save your changes.
About user accounts for managed devices
Managed BIG-IP systems contain accounts that specify the authorization (level of access) for users. When you configure user account information on a BIG-IP system, you set parameters such as user names and passwords, shell access information, web interface and root access privileges, and an authentication source. You can use Enterprise Manager to view and copy account parameters from managed devices to other managed devices, as well as to modify passwords.