Role-Based Access Control
Prerequisite
For details on procuring access or adding users to gain access on IoT OD, refer to Add and Manage User Access.
Overview
Role-based access control (RBAC) is a security control intended to segregate the ability for users to access and interact at different levels with various resources in a system. RBAC enables an administrator (admin) to efficiently manage system-provided (predefined) roles or create customized (custom) roles. By combining read-only and/or read-write permissions, the admin can tailor these roles to match the user's requirements in IoT OD's Application Manager.
IoT OD's Role-based access control, offers the following system-provided (predefined) roles for the Application Manager:
- App Manager Admin (read-write)
- App Manager User (read-only)
The system-provided roles can simplify the initial stage of using the App Manager and help manage the service's basic security posture.
Besides the system-provided roles, IoT OD's RBAC has extensive capabilities to create custom roles. The following tables provide available read-only and read-write permissions that can be used for custom role creation. The permissions are aggregated into buckets that reflect the structure of the App Manager to help with the process of custom role creation.
Permissions for Applications management (App Manager only)
User Interface | Permissions type | Permissions |
---|---|---|
Application Manager > Applications | Read-only permissions | * View list of applications * View application Instances * View Application details * View App Instance details and additional information such as viewing App Logs, IP Configuration, and Resource usage * Perform device-level actions such as Device refresh, Download Tech support logs |
Application Manager > Applications | Read-write permissions | * View list of Applications * View Application Instances * View Application details * View App Instance details and additional information (View App Logs, View IP Configuration, View Resource Usage) * Perform Device level actions (Device Refresh, Download Tech support logs) * Add Application * Install Application * Delete Application * Change Application configuration * Perform App level actions (Start/Stop/Uninstall/Change version) |
Permissions for Device Inventory (App Manager only)
User Interface | Devices | Permissions type | Permissions |
---|---|---|---|
Application Manager > Devices | Registered | Read-only permissions | * View list of externally-managed devices in Registered table * View device details, Event Log, Troubleshooting or Health Check tabs |
Application Manager > Devices | Registered | Read-write permissions | * View list of externally-managed devices in Registered table * View device details, Event Log, Troubleshooting or Health Check tabs * Deactivate externally-managed devices * Edit device details * Run troubleshooting commands |
Application Manager > Devices | Staged | Read-only permissions | * View externally-managed devices in Staged tab * View device details and Event Log tabs * View CSV upload history |
Application Manager > Devices | Staged | Read-write permissions | * View externally-managed devices in Staged tab * View device details and Event Log tabs * View CSV upload history * Download CSV template for bulk device onboarding * Add externally-managed devices (through single or multiple flows) * Edit device details * Delete devices |
Permissions for Device Profiles (App Manager only)
User Interface | Permissions type | Permissions |
---|---|---|
Application Manager > Device Profiles | Read-only permissions | * View list of all Device Profiles * View Device Profile details |
Application Manager > Device Profiles | Read-write permissions | * View list of all Device Profiles * View Device Profile details * Create Device Profiles * Edit Device Profiles * Delete Device Profiles |