Configuring Access Control for ConnectionsAccess Manager Plus provides an access control workflow mechanism that allows users to restrict access to the connections added by them. When the access control is in place, no user other than the one who added the particular connection will be able to view the passwords or launch a remote connection unless their access request is approved by the owner.
1. Glossary of Terminologies2. How does the Connection Access Control Mechanism Work?When access control is enabled for a connection, a structured approval workflow is triggered for users attempting to access the connection. The process unfolds as follows:
This mechanism ensures that access to shared connections remains controlled, secure, and auditable, protecting sensitive credentials from unauthorized modifications or misuse. 2.1 Precedence for Viewing a Connection Password in Plain TextThe ability to view a connection password in plain text is governed by a hierarchical permission structure that determines access based on administrative settings and user group privileges. Administrator Privileges: Administrators have unrestricted access to view connection passwords in plain text, regardless of whether the option Allow plain text view of passwords, if auto logon is configured enabled under general settings, or Allow plain text view of passwords at the user group level setting. Standard User Restrictions: A Standard User can view the password of a shared connection in plain text only if the allow plain text view of passwords option is enabled in both general settings and user group privilege settings (for the group to which the user belongs). If this setting is disabled in either of the above places, the standard user cannot view the password of their own connections or shared connections By enforcing these settings, organizations can maintain strict control over password visibility, ensuring that sensitive credentials are only accessible under predefined security policies. 3. How to Implement Access Control for Connections?To enable access control for a new connection, first, follow the instructions specified here to add a new connection. Once you have added a connection, follow the steps below to configure access control settings for them:
In the Configure Access Control dialog box that opens, there are three tabs available: 3.1 Excluded UsersExclude a set of users or user groups from the request-release workflow using this option. The excluded users will be able to access passwords directly without raising connection access requests. 3.2 Miscellaneous Settings
3.3 Auto ApprovalAccess Manager Plus provides the option to set automatic approval of password access requests. This auto-approval feature will be handy during the times when the connection owner may not be available to approve access requests for users. There are three ways in which connections owners can set up auto-approval:
Once you have configured the necessary options for setting up the access control workflow for a connection, click Save & Activate. To deactivate access control for a connection for which access control is already configured, click the Deactivate option in this window. 4. Precedence for Modifying Connection Settings for a Shared ConnectionBy default, users can modify the settings of a shared connection via the Actions drop-down. However, access control configuration of a connection is an exception, as they can only be modified by the connection owner for security reasons. Administrators can restrict users from modifying the access control relevant settings of a shared connection via:
When both restrictions are in place, the General Settings configured by the administrator take precedence over User Group Privilege Settings. However, this precedence changes when Connection Access Control is enabled for a specific shared connection. If a connection is locked using access control, it overrides individual user privileges and restricts the ability to modify connection settings via the Actions drop-down. 4.1 Scenarios Where a Standard User Can Modify Connection Access Control SettingsThere are only two scenarios where a standard user is permitted to modify the settings of a shared connection via the Actions drop-down menu. The conditions for each scenario are detailed below. Scenario 1: Access Control Enabled | User in Excluded List | Allowed User Group Privilege
Outcome: User A can modify the connection settings of CHNQATEST-01 from the Actions drop-down. Scenario 2: Access Control Disabled | Allowed User Group Privilege
Outcome: User A can modify the connection settings of CHNQATEST-01 from the Actions drop-down. 4.2 Scenarios Where a Standard User Cannot Modify Connection Access Control SettingsBelow are various scenarios in which a standard user is restricted from modifying the settings of a shared connection via the Actions drop-down menu. Scenario 1: User Not in Excluded List | Access Control Enabled
Scenario 2: User in Excluded List | Access Control Enabled
Scenario 3: User Not in Excluded List | Access Control Enabled | Restricted User Group Privilege
Scenario 4: Access Control Disabled | Restricted User Group Privilege
Scenario 5: User in Excluded List | Access Control Enabled | Allowed User Group Privilege
Scenario 6: User Not in Excluded List | Connection Control Enabled | Allowed User Group Privilege
Scenario 7: Connection Control Disabled | Allowed User Group Privilege
Scenario 8: User in Excluded List | Access Control Enabled | Restricted User Group Privilege
Scenario 9: User Not in Excluded List | Access Control Enabled | Restricted User Group Privilege
Scenario 10: Access Control Disabled | Restricted User Group Privilege
5. Request and Approval Workflow OperationsFollowing are the operations related to the request-release access control workflow: 5.1 Requesting Access to a Connection PasswordTo access a connection enabled with access control workflow, a user will have to request the connection owner to grant permission to view the connection. Follow the steps to make a connection request:
5.2 Approving a Connection RequestIf you are an administrator and a user has requested your approval to view a connection, you will receive an email notification about the request. You can view all the requests pending your approval from the Admin tab. To approve a request, follow these steps:
5.3 Check In Password After Connection UsageThe core of the access control mechanism ensures that users receive only temporary access to connections based on the set duration. If a user finishes their work before the expiry of the allotted time, they can give up access and end the connection. To end the connection, click the Check In button beside the connection name. Now, the connection access will be checked back into the system and the status will change to Request again. You will no longer be able to view the password and access the connection. In case you require access again, you will have to go through the request-release process again. 5.4 Forcefully Check In a Connection PasswordAccess control mechanism allows exclusive access privilege to a user for a specified period. During this period, no one else will be allowed to access the connection. In case an emergency arises to revoke the exclusive permission of the user, the connection owner can forcefully check in the password and revoke access at any point of time. To Check In a connection password forcefully, follow these steps:
©2025, Zoho Corporation Pvt. Ltd. All Rights Reserved. |