Add and manage user access
Introduction
Add users to provide access to your organization's network devices, configuration, and monitoring (events and alerts). Access roles are assigned to each user to define the features and functions they can access.
Built-in roles provide default sets of functionality, but you can also create custom roles that define different sets of access permissions or privileges. For example, you can create an "EI Management" role with permissions to manage data and assets. Users assigned to that role will gain those permissions. Create another "Operator" role for users that can only monitor the health of data policies and EI agents.
IoT Operations Dashboard (OD) provides Roles and Permissions for users. A Role is defined as a collection of one or more Permissions. We provide two default Roles with a specific set of pre-determined Permissions. The default Roles and accompanying Permissions cannot be changed. The built-in Roles have the following capabilities and privileges:
Tenant Admin:
- Manage users. Add, delete, grant, and remove roles.
- Manage sub-tenants (sub-organizations) and control who has access to them. Sub-tenant access extends a user's access privileges to sub-organizations.
- Create custom roles.
Device Operator:
- Manage and troubleshoot devices. Add, delete, and edit groups and templates.
- Manage firmware upgrades, other services, and connected client access.
- View passwords.
You can create Custom Roles. Using a custom role, you can add one or more permissions.
Requirements
You must have Tenant Admin permissions to manage users and organizations.
Add Users
Click the "people icon" on the far right of the header. Click Access Control.
Click Users > Add user.
Enter a valid email address.
- A welcome email with login and password instructions will be sent to this address.
- If your organization uses SSO, users receive an email but are not prompted to enter a password. They will use their corporate credentials to log in instead.
Select one or more Roles to define the user's access permissions. The list includes pre-defined roles and your organization's custom roles.
Select Extend Roles to Sub-tenants to apply the same roles to any sub-organizations the user can access.
Click Add.
If the user is not present in CCI, you will be required to enter additional parameters for the user, such as First Name, Last Name and Country / Region. Click Add. The user will receive two emails: one to activate the CCI account and change the password, and another to welcome and log in to IOT OD. For details on CCI, see Cisco SSO Login Experience
Note: When the user is a member of both the parent and one of the child organizations with different permissions in each, the user has access that is inclusive to both the parent and child organizations.
Create custom roles
Click the "people icon" on the far right of the header. Click Access Control.
Click Roles > Create Custom Role.
Enter a meaningful name, such as "EI Operator".
Select a service, such as Edge Intelligence.
Select one or more permissions available for the selected IoT OD service.
Click Save.
Built-in roles
Cisco IoT OD includes the following built-in roles.
Edge Intelligence roles
- EI Admin – Full access to all EI functions, including the ability to deploy or undeploy data-policies.
- Operator – Can add or remove new EI Agents to the system, including:
- Create tokens used to connect a new EI Agent to the cloud.
- Remove an EI Agent that is disconnected from the cloud.
- Asset Expert – Can manage the inbound data, including:
- Source Data Model Definitions. For example: tell the system to fetch the upper and lower temperature data from a modbus tcp speaking fridge over 2 modbus registers.
- Source Asset Instance Definitions. For example, define how many fridges of that type are available to fetch data from and what are their IP addresses.
- Mapping of Source Asset Instances to EI Agents. For example, which gateways should contact which fridge (the gateway needs to be on the same floor/in the same building as the fridge to be able to reach it over the network).
- Data Logic Developer – Can develop Data Logics in Visual Studio Code.
Edge Device Manager roles
- Tenant Admin
- Device Operator
Edge Device Manager permissions
Permissions and what actions a user can perform using those permissions are defined in the following table. You cannot create custom permissions.
Permission | Description |
---|---|
Access Connected Clients | * Access any access methods within the organization in SEA * Open a session in SEA or cross-launch a session to a connected client in EDM without needing to be added to a group |
Add Devices | * Add devices to the inventory * View list of configuration groups and templates * Cannot view device inventory, hence should be used along with View Devices/Manage Devices permission * Cannot view CSV upload history |
Configure Unused Devices | * View Dashboard and Device Inventory * Assign or modify the configuration group for a set of devices in the Unused Inventory * Edit device details (name, latitude, longitude), per device configuration parameters for one or more devices in the Unused Inventory |
Deactivate Devices | * View Dashboard and Device Inventory * Deactivate devices from the Inventory |
Delete Devices | * View Dashboard and Device Inventory * Delete devices from the Inventory |
Manage Applications | * Applications module - view and perform all actions * Cannot view EDM menu if used alone; use with another suitable permission * Use with View Devices/Manage Devices permission to install applications on a list of devices * Use with Manage Groups permission to install applications on a group of devices |
Manage Devices | * View Dashboard and Device Inventory * Add devices, troubleshoot devices, and manage groups * Deactivate devices, delete devices, and view CSV upload history * Edit device details (name, latitude, longitude), per device configuration, and push configuration to a single device * Manage connected clients for a device * Operations module - view alerts and events, close active alerts, and view/manage alert rules * Cannot view device admin password or manage notification settings |
Manage Firmware Upgrades | * View Dashboard and Device Inventory * Software module - view and perform all actions such as scheduling software update jobs, cancelling jobs, etc. |
Manage Groups | * View Dashboard and Device Inventory * Manage templates * View, create, update, delete and manage configuration groups * Push configuration to a group of devices |
Manage Templates | * View Dashboard and Device Inventory * View, create, update, delete and manage configuration templates |
Request Device Deactivation | * Request for device deactivation/deletion from the inventory * Cannot view Device Inventory; use with View Devices/Manage Devices permission |
Troubleshoot Devices | * View Dashboard and Device Inventory * Run troubleshooting jobs on a device like ping, traceroute, show commands, reboot device, and refresh device metrics |
View Devices | * View Dashboard, Device Inventory, Device Summary, Monitoring, Event Log, Interfaces, Connected Clients * Operations module - view alerts (active and closed) and events * Operations module - close active alerts * Cannot view device admin password or run device troubleshooting |
View Password | * View device admin password * Cannot view Device Inventory or device summary; use with View Devices/Manage Devices permission |
IMPORTANT: When changing/updating the permissions, you must log out and log back in to IoT OD for the new permissions to work.
Note:
- When setting the Configure Unused Devices permission to a user, the user can assign only unused devices to a group.
- If a device is in the Unused Device inventory and the user has the Configure Unused Devices permission set, then the user can edit the device configuration. A user with the Configure Unused Devices permission cannot edit a device configuration on a device in the In Use inventory.
Application Manager
IoT OD's Role-based access control (RBAC), offers the following system-provided (predefined) roles for the Application Manager service:
- Application Manager Admin(read-write)
- Application Manager User(read-only)
Note: For detailed information on the above roles, see Role-based Access Control.
Secure Equipment Access (SEA) roles
- SEA System Admin – View and manage Network Devices, Connected Clients, and Access Methods.
- SEA Access Admin – Launch remote sessions and manage access groups.
- SEA User – Launch remote sessions.
Industrial Asset Vision
- Asset Vision User – View the dashboard, sensor catalog; Create, edit, and delete assets; View the sensor and the network devices details; Create alert rules and view alerts; Generate and view reports; Create, update, and delete asset types.
- IT Admin – View the dashboard, sensor catalog; Create, update, and delete assets; View the sensor details; View and delete network devices; Create alert rules and view alerts; Generate and view reports; View sensor health; Add, edit, and delete integrations; View asset types details.
- Asset Vision Installer – View sensor health; Add, edit, and delete assets; Onboard, view, and delete sensors; Onboard, view, and delete network devices; View asset types details.
- Contact Tracing User – View network devices details; Create alert rules and view alerts; Generate and view reports; View sensor catalog; Add, edit, and delete aliases; Add, edit, and delete badges; View collisions records.
Industrial Wireless
- IW viewmode – View the Inventory and device Summary pages; read the configuration of each device of the selected organization.
- IW Admin – View the Inventory and device Summary pages; read and edit the configuration of each device of the selected organization, push configurations updates; manage firmware upgrades of the connected devices (online mode); add devices to an organization with the list of serial numbers / MAC addresses; and download configuration file for offline mode configuration.