Add users to provide access to your organization's network devices, configuration, and monitoring (events and alerts). Access roles are assigned to each user to define the features and functions they can access.
Built-in roles provide default sets of functionality, but you can also create custom roles that define different sets of access permissions or privileges. For example, you can create an "EI Management" role with permissions to manage data and assets. Users assigned to that role will gain those permissions. Create another "Operator" role for users that can only monitor the health of data policies and EI agents.
IoT Operations Dashboard (OD) provides Roles and Permissions for users. A Role is defined as a collection of one or more Permissions. We provide two default Roles with a specific set of pre-determined Permissions. The default Roles and accompanying Permissions cannot be changed. The built-in Roles have the following capabilities and privileges:
Manage users. Add, delete, grant, and remove roles.
Manage sub-tenants (sub-organizations) and control who has access to them. Sub-tenant access extends a user's access privileges to sub-organizations.
Create custom roles.
Manage and troubleshoot devices. Add, delete, and edit groups and templates.
Manage firmware upgrades, other services, and connected client access.
You can create Custom Roles. Using a custom role, you can add one or more permissions.
You must have Tenant Admin permissions to manage users and organizations.
Click the "people icon" on the far right of the header. Click Access Control.
Click Users > Add user.
Enter a valid email address.
A welcome email with login and password instructions will be sent to this address.
If your organization uses SSO, users receive an email but are not prompted to enter a password. They will use their corporate credentials to log in instead.
Select one or more Roles to define the user's access permissions. The list includes pre-defined roles and your organization's custom roles.
Select Extend Roles to Sub-tenants to apply the same roles to any sub-organizations the user can access.
Note: When the user is a member of both the parent and one of the child organizations with different permissions in each, the user has access that is inclusive to both the parent and child organizations.
Create custom roles
Click the "people icon" on the far right of the header. Click Access Control.
Click Roles > Create Custom Role.
Enter a meaningful name, such as "EI Operator".
Select a service, such as Edge Intelligence.
Select one or more permissions available for the selected IoT OD service.
Cisco IoT OD includes the following built-in roles.
Edge Intelligence roles
EI Admin – Full access to all EI functions, including the ability to deploy or undeploy data-policies.
Operator – Can add or remove new EI Agents to the system, including:
Create tokens used to connect a new EI Agent to the cloud.
Remove an EI Agent that is disconnected from the cloud.
Asset Expert – Can manage the inbound data, including:
Source Data Model Definitions. For example: tell the system to fetch the upper and lower temperature data from a modbus tcp speaking fridge over 2 modbus registers.
Source Asset Instance Definitions. For example, define how many fridges of that type are available to fetch data from and what are their IP addresses.
Mapping of Source Asset Instances to EI Agents. For example, which gateways should contact which fridge (the gateway needs to be on the same floor/in the same building as the fridge to be able to reach it over the network).
Data Logic Developer – Can develop Data Logics in Visual Studio Code.
Edge Device Manager roles
Edge Device Manager permissions
Permissions and what actions a user can perform using those permissions are defined in the following table. You cannot create custom permissions.
Access Connected Clients
* Access any access methods within the organization in SEA * Open a session in SEA or cross-launch a session to a connected client in EDM without needing to be added to a group
* Add devices to the inventory * View list of configuration groups and templates * Cannot view device inventory, hence should be used along with View Devices/Manage Devices permission * Cannot view CSV upload history
Configure Unused Devices
* View Dashboard and Device Inventory * Assign or modify the configuration group for a set of devices in the Unused Inventory * Edit device details (name, latitude, longitude), per device configuration parameters for one or more devices in the Unused Inventory
* View Dashboard and Device Inventory * Deactivate devices from the Inventory
* View Dashboard and Device Inventory * Delete devices from the Inventory
* Applications module - view and perform all actions * Cannot view EDM menu if used alone; use with another suitable permission * Use with View Devices/Manage Devices permission to install applications on a list of devices * Use with Manage Groups permission to install applications on a group of devices
* View Dashboard and Device Inventory * Add devices, troubleshoot devices, and manage groups * Deactivate devices, delete devices, and view CSV upload history * Edit device details (name, latitude, longitude), per device configuration, and push configuration to a single device * Manage connected clients for a device * Operations module - view alerts and events, close active alerts, and view/manage alert rules * Cannot view device admin password or manage notification settings
Manage Firmware Upgrades
* View Dashboard and Device Inventory * Software module - view and perform all actions such as scheduling software update jobs, cancelling jobs, etc.
* View Dashboard and Device Inventory * Manage templates * View, create, update, delete and manage configuration groups * Push configuration to a group of devices
* View Dashboard and Device Inventory * View, create, update, delete and manage configuration templates
Request Device Deactivation
* Request for device deactivation/deletion from the inventory * Cannot view Device Inventory; use with View Devices/Manage Devices permission
* View Dashboard and Device Inventory * Run troubleshooting jobs on a device like ping, traceroute, show commands, reboot device, and refresh device metrics
* View Dashboard, Device Inventory, Device Summary, Monitoring, Event Log, Interfaces, Connected Clients * Operations module - view alerts (active and closed) and events * Operations module - close active alerts * Cannot view device admin password or run device troubleshooting
* View device admin password * Cannot view Device Inventory or device summary; use with View Devices/Manage Devices permission
IMPORTANT: When changing/updating the permissions, you must log out and log back in to IoT OD for the new permissions to work.
When setting the Configure Unused Devices permission to a user, the user can assign only unused devices to a group.
If a device is in the Unused Device inventory and the user has the Configure Unused Devices permission set, then the user can edit the device configuration. A user with the Configure Unused Devices permission cannot edit a device configuration on a device in the In Use inventory.
IoT OD's Role-based access control (RBAC), offers the following system-provided (predefined) roles for the Application Manager service:
Asset Vision User – View the dashboard, sensor catalog; Create, edit, and delete assets; View the sensor and the network devices details; Create alert rules and view alerts; Generate and view reports; Create, update, and delete asset types.
IT Admin – View the dashboard, sensor catalog; Create, update, and delete assets; View the sensor details; View and delete network devices; Create alert rules and view alerts; Generate and view reports; View sensor health; Add, edit, and delete integrations; View asset types details.
Asset Vision Installer – View sensor health; Add, edit, and delete assets; Onboard, view, and delete sensors; Onboard, view, and delete network devices; View asset types details.
Contact Tracing User – View network devices details; Create alert rules and view alerts; Generate and view reports; View sensor catalog; Add, edit, and delete aliases; Add, edit, and delete badges; View collisions records.
IW viewmode – View the Inventory and device Summary pages; read the configuration of each device of the selected organization.
IW Admin – View the Inventory and device Summary pages; read and edit the configuration of each device of the selected organization, push configurations updates; manage firmware upgrades of the connected devices (online mode); add devices to an organization with the list of serial numbers / MAC addresses; and download configuration file for offline mode configuration.