Applications Manager permits five different roles to work with the product apart from the default admin role. The different roles are Normal Admin, Delegated Admin, User, Operator and Manager.
Default / Super Admin : The system Super Administrators are allowed to perform all admin activities. The Super Administrator role also has the privilege to configure user management. The Super Admin role is the default admin user and it cannot be deleted or renamed.
In the Settings page, click User Management under Global Configurations to browse through the following tabs:
Note: User management is not supported for the Applications Manager plugin build over OpManager. At present, there are only two types of roles available for plugin users - Administrator and Read-Only User. Operator, Delegated Admin and Manager role is not supported. Applications Manager Plugin users cannot assign monitors to the any specific users in the Apps tab. They can view all the default monitors only.
Applications Manager provides you with the ability to manage users and roles for your enterprise, with roles assigned to users and different permissions associated to each role. This is achieved by first adding users and associating the users with the roles.
You can also import users from Active Directory or LDAP. This functionality is implemented as a more convenient method to add a large number of users and to ease the user management in Applications Manager. You can import users and perform role configuration for LDAP and Active Directory users and groups in Applications Manager.
The system administrators are allowed to perform all admin activities as explained in Performing Admin Activities. The admin role also has the privilege to configure user management as explained below.
Note: Username field containing any of the following special characters will not be accepted: / \ [ ] : ; | = , * ? < > " ' ` % -- $$
You can import users and perform role configuration for LDAP, Active Directory and JumpCloud users and groups in Applications Manager.
Users imported from the Active Directory, LDAP, or JumpCloud can login into Applications Manager using their Active Directory/LDAP/JumpCloud credentials. Since user authentication is done in the Domain Controller all the account policy regulations of the company/domain is automatically inherited to Applications Manager credentials also.
You can select an already added domain from the drop-down list or add a new domain. You can also edit the existing Domain controller settings in the same manner.
Note: Username field containing any of the following special characters will not be accepted: / \ [ ] : ; | = , * ? < > " ' ` % -- $$
You can edit User Profiles from the list of users.
You can create User Groups in Applications Manager with roles assigned to users or import user groups from Active Directory, LDAP, or JumpCloud.
Add new user groups to Applications Manager
- In Settings page, click User Management under Global Configurations.
- Click the User Groups tab. This lists down the User Groups in Applications Manager.
- To add a new user group, click Add new. This opens the 'New User Group' screen.
- Specify a User Group name.
- Choose the users to be added to the group.
- Select the monitor group to which the new users must be granted privileges.
- Click Create User Group. The new user groups will be displayed in the User Groups table.
Importing user groups from domain
Users in the groups imported from the Active Directory, LDAP, or JumpCloud can login into Applications Manager using their Active Directory/LDAP/JumpCloud credentials. Since user authentication is done in the Domain Controller all the account policy regulations of the company/domain is automatically inherited to Applications Manager credentials also.
- In Settings page, click User Management under Global Configurations.
- Click the User Groups tab.
- Click the Import User Groups from domain link under the list of user profile
- Select a domain name from the drop-down list.
The users in groups imported from Active Directory/LDAP/JumpCloud will be associated automatically to that particular usergroup during login.
For Active Directory Users, the admin can import their group and use this feature in permissions tab (Create a new user account if the user logs in with domain authentication.)
Adding a New Domain
You can select an already added domain from the drop-down list or add a new domain. You can also edit the existing Domain controller settings in the same manner.
- Select the Add New Domain option from the Domain Name drop-down list.
- Enter the following details:
- Domain Name: Name of the domain from where the users need to be imported.
- Domain Controller: The hostname or the IP address of the DNS server for the domain.
- Domain Port: The port of the DNS server.
- Authentication Type: The authentication type of the domain user. (LDAP, Active Directory, or JumpCloud)
- Base DN: JumpCloud Base Distinguished Name (DN) of the user. Eg. For JumpCloud, ou=users,o=<YOUR ORG ID VALUE>,dc=jumpcloud, dc=com
- Username: Active Directory / OpenLDAP / JumpCloud username of the domain user. The active directory username of the domain user should be provided in DOMAIN\username format. The LDAP user name should be provided in cn=user,dc=domain,dc=name format. The JumpCloud user name should be provided in uid=<LDAP Bind DN Username>,ou=users,o=<YOUR ORG ID VALUE>,dc=jumpcloud,dc=com format.
- Password : Active Directory / OpenLDAP /JumpCloud password of the domain user.
- Search Filter: To filter out search result you can use characters followed by * as well as the role criterion in LDAP search filter format. These search filters use one of the following formats <filter>=(<attribute><operator><value>) or (<operator><filter1><filter2>). For example: "(&(objectCategory=person)(objectClass=user)(!cn=andy))"- All user objects but "andy".
- Click on the Fetch User Groups button to import user groups from the active directory, LDAP, or JumpCloud.
- When the list of existing users is displayed select the user(s) to be added, assign roles and click on Add User Groups to add the users.
- You can also edit User Profiles from the list of users.
You can import multiple users from other domains like Active Directory, OpenLDAP, and JumpCloud to Applications Manager. Configure the following details:
Note: This option enables LDAPS and secures your LDAP server connection between client and server application to encrypt the communication.
You can associate users and user groups to multiple domains:
If the 'Create a new user account if the user logs in with domain authentication' checkbox in the Permissions tab is checked, users are created automatically based on their role in the user group.
Using the Permissions options, you can allow Operators to manage / unmanage monitors, reset the status of monitors, edit display names, execute actions, start/stop/restart services, update IP Addresses, use Command Shell and clear Alarms.
The operator role can also be granted permission to configure the Downtime Schedule and view Downtime Schedules. If you've chosen the option "Allow operator to configure Downtime Schedule", you will only see the Downtime Schedules configured by this user and you can schedule new downtimes to Monitors and Monitor Groups associated to you. If you'd like the user to view all the Downtime Schedules then please make sure you also choose the option "Allow operator to view all Downtime Schedules". The Downtime Scheduler option will be available as link in the Bulk Configuration view under the Monitor tab since the Settings tab is not available for the Operators.
You can also allow the "Jump to link" option to be displayed for operators (Jump to link refers to access Add-On Products (like OpManager, Service Desk) and Managed Servers). In addition, you can also allow the user to view Managed servers by enabling the 'Allow operator to view Managed servers' option for Enterprise Edition Admin server.
You can allow admin to use Command Shell and to stop/start/restart Windows services. You can give permission to an administrator to Enable Delegated Admin Preferences. The admin can also be granted permission to create a new user account if the user logs in with domain authentication. The new user account will be created only when the Usergroup to which the user belongs is already imported from the same domain
IBM i Permissions allow you to permit Operators to execute IBM i Admin activities like controlling Message and Logging, Network Attributes, Date and Time, System Control, Library List, Storage, Allocation, Security, Jobs, Spool, Subsystem and using Non-Interactive Commands. By default, Applications Manager allows admin user(s) to execute IBM i operations but the option can be disabled.
This is for Operator only. Using View option, you can define how to represent your subgroup in the webclient.You can either show the associated subgroups directly in the home tab itself or from the corresponding top level Monitor Group.
You can configure Account Policies in Applications Manager to enhance web client security. Following is the list of options that are available under the Account Policy tab:
You can import users and perform role configuration for LDAP users and groups in Applications Manager. Users and groups are fetched into Applications Manager from different domains, based on the entry in the authentication.conf file found in the following location. For LDAP configuration, you can edit the ldapConfiguration.conf file found under <Applications Manager Home>/conf directory.
LDAP Configuration
ldap.group.commonNameAttribute=cn
ldap.group.primaryAttribute=cn
ldap.group.displayNameAttribute=cn
ldap.group.objectCategory=group
ldap.group.objectClass=posixGroup;groupOfNames
ldap.group.memberAttribute=member;memberUid
ldap.group.memberofAttribute=
ldap.group.groupTokenAttribute=gidNumber
ldap.user.commonNameAttribute=cn
ldap.user.primaryAttribute=uid
ldap.user.displayNameAttribute=cn
ldap.user.objectCategory=person
ldap.user.objectClass=person;posixAccount
ldap.user.memberofAttribute=
ldap.user.emailAttribute=mail
ldap.user.groupidAttribute=gidNumber
Active Directory Configuration
ad.group.commonNameAttribute=cn
ad.group.primaryAttribute=sAMAccountName
ad.group.displayNameAttribute=cn
ad.group.objectCategory=group
ad.group.objectClass=group
ad.group.memberAttribute=member
ad.group.memberofAttribute=memberOf
ad.group.groupTokenAttribute=primaryGroupToken
ad.user.commonNameAttribute=cn
ad.user.primaryAttribute=sAMAccountName
ad.user.displayNameAttribute=displayname
ad.user.objectCategory=person
ad.user.objectClass=
ad.user.memberofAttribute=memberOf
ad.user.emailAttribute=mail
ad.user.groupidAttribute=primaryGroupID
Note: If you have changes in LdapConfiguration.conf and later want to retain the initial configuration, simply rename the file (for example, rename it to LdapConfiguration_old.conf) or move the file to different location and restart Applications Manager.
The delegated administration role is used to assign limited administrative privileges to users in your organization who aren't administrators. By delegating administration, you can assign a range of administrative tasks to the appropriate users and let operators take more control of their local network resources.
Enabling Delegated Admin Preferences:
Delegated Administrator Privileges
The following table lists the User Privileges of the Delegated Admin role in various scenarios:
Scenario | Delegated Administrator User Privileges | ||
---|---|---|---|
Credential Manager |
Permission to create profiles and to edit and delete profiles which he has created. |
||
Action | Permission to create new actions and to edit and delete actions which he has created. Additionally he can also view the actions associated to the monitors for which he has ownership. | ||
New Monitor and Monitor Group | Permission to create new monitors and monitor groups, and to edit and delete new monitors and monitor groups for which he has ownership. | ||
Threshold and Anomaly Profiles | Permission to create new profiles and to edit and delete profiles which he has created. Additionally he can also view the profiles associated to the monitors for which he has ownership. | ||
Schedule Report | Permission to create reports and to edit and delete reports which he has created. | ||
Downtime Scheduler | Permission to schedule the time period for which monitoring is not required. | ||
Alarm Escalation | Permission to escalate an alarm and configure rules for alarm escalation. | ||
Configure Alarms | Permission to configure alarms by monitor groups for which he has ownership. | ||
Process and Service Template | Permission to add and apply new process template to monitor groups and selected monitors alone. | ||
Event Log Rules | Permission to configure Event Log Rules applicable only to monitor groups and selected monitors. | ||
Dashboards / Widgets | Permission to create dashboards and view default dashboards in Read-Only mode. | ||
Performance Polling, Global Trap, SNMP Trap Listener, User Management, Data Retention, Managed Server Administration, SLA, World Map View, Product License, Action Alarm Settings | Not supported for Delegated Admin Role |