Suchen

Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Chapter 3. Predefined User Access roles

download PDF

The following table lists the predefined roles provided with User Access. Some of the predefined roles are included in the Default access group, which includes all authenticated users in your organization.

Only the Organization Administrator users in your organization inherit the roles in the Default admin access group. Because this group is provided by Red Hat, it is updated automatically when Red Hat assigns roles to the Default admin access group.

For more information about viewing predefined roles, see Chapter 2, Procedures for configuring User Access.

NOTE
Predefined roles are updated and modified by Red Hat and cannot be modified. The table might not contain all currently available predefined roles.
Table 3.1. Predefined roles provided with User Access
Role nameDescriptionDefault access groupDefault admin access group

Compliance administrator

A Compliance role that grants full access to any Compliance resource.

 

X

Compliance viewer

A Compliance role that grants read access to any Compliance resource.

X

 

Drift analysis administrator

Perform any available operation against any Drift Analysis resource.

 

X

Drift viewer

Perform read only operation against Drift Analysis resources.

X

 

RHEL Advisor administrator

Perform any available operation against any RHEL Advisor resource.

X

 

Inventory Groups Administrator

Be able to read and edit Inventory Groups data.

 

X

Inventory Groups Viewer

Be able to read Inventory Groups data.

  

Inventory Hosts Administrator

Be able to read and edit Inventory Hosts data.

X

X

Inventory Hosts Viewer

Be able to read Inventory Hosts data.

  

Inventory administrator

Perform any available operation against any Inventory resource.

  

Malware detection administrator

Perform any available operation against any malware-detection resource.

 

X

Malware detection viewer

Read any malware-detection resource.

  

Notifications administrator

Perform any available operation against Notifications and Integrations applications.

 

X

Notifications viewer

Read only access to notifications and integrations applications.

  

Patch administrator

Perform any available operation against any Patch resource.

 

X

Patch viewer

Read any Patch resource.

X

 

Policies administrator

Perform any available operation against any Policies resource.

 

X

Policies viewer

Perform read only operation against any Policies resource.

X

 

Remediations administrator

Perform any available operation against any Remediations resource

  

Remediations user

Perform create, view, update, delete operations against any Remediations resource.

X

 

Resource Optimization administrator

Perform any available operation against any Resource Optimization resource.

 

X

Resource Optimization user

A Resource Optimization user role that grants read only permission.

X

 

Tasks administrator

Perform any available operation against any Tasks resource.

 

X

User Access administrator

Grants a non-org admin full access to configure and manage user access to services hosted on console.redhat.com. This role can only be viewed and assigned by Organization Administrators.

  

User Access principal viewer

Grants a non-org admin read access to principals within user access.

  

Vulnerability administrator

Perform any available operation against any Vulnerability resource.

 

X

Vulnerability viewer

Read any Vulnerability resource.

X

 
Red Hat logoGithubRedditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat Dokumentation

Wir helfen Red Hat Benutzern, mit unseren Produkten und Diensten innovativ zu sein und ihre Ziele zu erreichen – mit Inhalten, denen sie vertrauen können.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

© 2024 Red Hat, Inc.