<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Roles and Permissions on</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/protegrity_agent/agent_roles_permissions/</link><description>Recent content in Roles and Permissions on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/protegrity_agent/agent_roles_permissions/index.xml" rel="self" type="application/rss+xml"/><item><title>Required Roles and Permissions</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/protegrity_agent/agent_roles_permissions/agent_roles/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/protegrity_agent/agent_roles_permissions/agent_roles/</guid><description>&lt;p>The Protegrity Agent uses role-based access control (RBAC) to govern access to its features. The Protegrity Policy Cloud gateway enforces all permissions through JSON Web Token (JWT) authentication. The Agent API does not perform permission checks internally.&lt;/p>
&lt;h1 id="roles">Roles&lt;/h1>
&lt;p>The following table lists the permissions assigned to the roles.&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Roles&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;th>Permissions&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>agent_admin&lt;/td>
 &lt;td>Grants full read-write access to policy, packages, and Insight&lt;/td>
 &lt;td>proagent_conversations_permission , proagent_responses_permission, proagent_health_permission, proagent_readiness_permission, proagent_liveness_permission, proagent_version_permission, proagent_ui_permission, proagent_doc_permission, proagent_log_permission, workbench_policy_view, workbench_policy_manage, workbench_certificate_export, workbench_package_export_dynamic, workbench_package_export_encrypted, insight_viewer, insight_admin, can_create_token&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>agent_reader&lt;/td>
 &lt;td>Restricts access to read-only operations&lt;/td>
 &lt;td>proagent_conversations_permission, proagent_responses_permission, proagent_health_permission, proagent_readiness_permission, proagent_liveness_permission, proagent_version_permission, proagent_ui_permission, proagent_doc_permission, proagent_log_permission, workbench_policy_view, insight_viewer, can_create_token&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>For more information about creating the role, refer to &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/protegrity_agent/agent_roles_permissions/agent_creating_roles/">Working with Roles&lt;/a>.&lt;/p></description></item><item><title>Working with Roles</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/protegrity_agent/agent_roles_permissions/agent_creating_roles/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/protegrity_agent/agent_roles_permissions/agent_creating_roles/</guid><description>&lt;p>This section describes about creating roles and users for the Protegrity Agent on a Protegrity Policy Cloud cluster. Roles define the features that a user can access. Users inherit permissions from their assigned roles.&lt;/p>
&lt;p>For more information about permissions, refer to &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/gov_policy/protegrity_agent/agent_roles_permissions/agent_roles/">Required Roles and Permissions&lt;/a>.&lt;/p>
&lt;h1 id="prerequisites">Prerequisites&lt;/h1>
&lt;ul>
&lt;li>A running PPC cluster with the Protegrity Agent deployed.&lt;/li>
&lt;li>&lt;code>kubectl&lt;/code> is configured and is accessible for the target PPC cluster.&lt;/li>
&lt;li>An admin account on the PPC cluster with required permissions to create roles and users.&lt;/li>
&lt;/ul>
&lt;h1 id="retrieving-the-gateway-host">Retrieving the Gateway Host&lt;/h1>
&lt;p>To store the PPC gateway address in a shell variable, run the following command .&lt;/p></description></item></channel></rss>