Roles are templates that include permissions and users can be assigned to one or more roles. Users in the appliance must be attached to a role.
The default roles packaged with ESA are as follows:
Roles | Description | Permissions |
---|---|---|
Policy Proxy User | Allows a user to connect to DSG via SOAP/REST and access web services using Application Protector (AP). | Proxy-User |
Policy User | Allows user to connect to DSG via SOAP/REST and perform security operations using Application Protector (AP). | Policy-User |
Security Administrator Viewer | Role that can view the ESA Web UI, CLI, and reports. | Security Viewer, Appliance CLI Viewer, Appliance web viewer, Reports Viewer |
Shell Accounts | Role who has direct SSH access to Appliance OS shell.Note: It is recommended that careful consideration is taken when assigning the Shell Accounts role and permission to a user.Ensure that if a user is assigned to the Shell Account role, no other role is linked to the same user. The user has no access to the Web UI or CLI, except when the user has password policy enabled and is required to change password through Web UI. | Shell (non-CLI) AccessNote: The user can access SSH directly if the permission is tied to this role. |
Security Administrator | Role who is responsible for setting up data security using ESA policy management, which includes but is not limited to creating policy, managing policy, and deploying policy. | Security Officer, Reports Manager, Appliance Web Manager, Appliance CLI Administrator, Export Certificates, DPS Admin, Directory Manager, Export Keys, RLP Manager |
The capabilities of a role are defined by the permissions attached to the role. Though roles can be created, modified, or deleted from the appliance, permissions cannot be edited. The permissions that are available to map with a user and packaged with ESA as default permissions are as follows:
Permissions | Description |
---|---|
Appliance CLI Administrator | Allows users to perform all operations available as part of ESA CLI Manager. |
Appliance Web Manager | Allows user to perform all operations available as part of the ESA Web UI. |
Audit Store Admin | Allows user to manage the Audit Store. |
Can Create JWT Token | Allows user to create JWT token for communication. |
Customer Business manager | Allows users to retrieve metering reports. |
DPS Admin | Allows user to use the DPS admin tool on the protector node. |
Export Certificates | Allows user to use download certificates from ESA. |
Key Manager | Allows user to access the Key Management Web UI, rotate ERK or DSK, and modify ERK states. |
Policy-User | Allows user to connect to Data Security Gateway (DSG) via REST and perform security operations using Application Protector (AP). |
RLP Manager | Allows user to manage rules stored on Row-Level Security Administrator (ROLESA). Manage includes accessing, viewing, creating, etc. |
Reports Viewer | Allows user to only view reports. |
Security Viewer | Allows user to have read only access to policy management in the Appliance. |
Appliance CLI Viewer | Allows user to login to the Appliance CLI as a viewer and view the appliance setup and configuration. |
Appliance web viewer | Allows user to login to the Appliance web-interface as a viewer. |
AWS Admin | Allows user to configure and access AWS tools if the AWS Cloud Utility product is installed. |
Directory Manager | Allows user to manage the Appliance LDAP Directory Service. |
Export Keys | Allows user to export keys from ESA. |
Reports Manager | Allows user to manage reports and do functions related to reports. Manage includes accessing, viewing, creating, scheduling, etc. |
Security Officer | Allows user to manage policy, keys, and do functions related to policy and key management. Manage includes accessing, viewing, creating, deploying, etc. |
Shell (non-CLI) Access | Allows user to get direct access to the Appliance OS shell via SSH. It is recommended that careful consideration is taken when assigning the Shell Accounts role and permission to a user. Ensure that if a user is assigned to the Shell Account role, no other role is linked to the same user. |
Export Resilient Package | Allows user to export package from the ESA by using the RPS API. |
Can Create JWT Token | Allows user to create a Java Web Token (JWT) for user authentication. |
ESA Admin | Allows user to perform operations on Audit Store Cluster Management. |
Insight Admin | Allows to perform operations on Discover Web UI. |
Proxy-User | Allows user to connect to DSG via REST and perform security operations using Application Protector (AP). |
SSO Login | Allows user to login to the system using the Single Sign-On (SSO) mechanism. |
The ESA Roles web UI is as seen in the following image.
Callout | Column | Description |
---|---|---|
1 | Role Name | Name of the role available on ESA. Note: If you want to edit an existing role, click the role name from the displayed list. After making required edits, click Save to save the changes. |
2 | Description | Brief description about the role and its capabilities. |
3 | Permissions | Permission mapped to the role. The tasks that a user mapped to a role can perform is based on the permissions enabled. |
4 | Action | The following Actions are available.
|
5 | Add Role | Add a custom role to ESA. |
Keep the following in mind when duplicating and deleting roles.
You can create a custom business role with permissions and privileges that you want to map with that role. Custom templates provide the flexibility to create additional roles with ease.
Perform the following steps to add a role. In those steps we will use an example role named “Security Viewer”.
In the Web UI, navigate to Settings > Users > Roles.
If you want to edit an existing role, click the role name from the displayed list. After making required edits, click Save to save the changes.
Click Add Role to add a business role.
Enter Security Viewer as the Name.
Enter a brief description in the Description text box.
Select custom as the template from the Templates drop-down.
Under Role Permissions and Privileges area, select the permissions you want to grant to the role.Click Uncheck All to clear all the check boxes. Ensure that you do not select the Shell (non-CLI) Access permission for users who require Web UI and CLI access.
Click Save to save the role.
Enter your password prompt appears. Enter the password and click Ok.