You are viewing an old version of this page. View the current version.
Compare with Current View Page History
« Previous Version 17 Next »
Roles control access to features and capabilities of the system (admin and security_admin roles have access to all capabilities).
In SimpleOne, roles can be separated into three abstract layers based on their daily duties and powers (roles are sorted in the ascending order):
- End-users;
- ITSM Agents;
- Administrators.
You can use standard system roles, or create a new one, depending on the business tasks and demands. To configure role powers and responsibilities, Create an ACL Rule for it.
The role can be designated to a user in many ways (they were described in the Role and Group Inheritance article).
End-users
Generally, end-users have no specific role in the system. They are able to raise tickets via Self-Service Portal, track their progress, add comments, but they can neither use the administrative interface nor perform any actions in it due to a lack of specific roles.
The only role in the system that can be assigned to end-user is the caller role,
ITSM Agents
ITSM Agents are the employees handling daily tasks in the system, for example, processing Incidents, or Change Requests, or configuring CMDB. To perform these duties, one or more roles should be designated to the agent, based on his tasks and responsibilities.
In SimpleOne, we have some roles for ITSM agents:
Role | Description |
---|---|
ITSM_agent | ITSM Agent can perform standard actions for an ITSM agent (like opening, updating, and closure incidents, changes, problems, and requests). It's a parent role for other ITSM-related activities roles. |
change_manager | Change Manager Can change the values of all fields in any Change Request, Change Task, Approval Ticket in any status except closed. |
cmdb_manager | CMDB manager can create, read, update, and delete records in Configuration Management Database |
incident_manager | Incident manager can change the values of all fields in any Incident, Incident Task in any state except Closed. |
problem_manager | Problem Manager can change the values of all fields in any Problem, Problem Task in any state except Closed. |
request_manager | Request Manager can change the values of all fields in any Service Request, Request Task in any state except Closed. |
service_catalogue_manager | Service Catalogue Manager can change the state of any Article related to any Service specification (Internal or External). |
service_level_manager | Service Level Manager can edit SLM related records (Agreement Commitment, Commitment Type, Timepoint Indicator, Timeframe Indicators). |
service_owner | Service Owner can change the state of any Article related to Service specification (Internal or External) of the owned Service. |
Administrators
Administrative roles can be divided into two groups:
- Administrative roles;
- Special administrative roles.
Specialists designated with the administrative roles have access to all system features and data and can pass all security checks.
In SimpleOne, there are two administrative roles:
Role | Description |
---|---|
admin | The System Administrator role. This role has access to all system features, functions, and data. |
security_admin | Grant modification access to High-Security Settings, allow a user to modify the Access Control List. |
Special administrative roles are able to grant specific administrative rights without the full privileges of the administrative role. For example, an administrator can create a notification rule but not the assignment rule.
In SimpleOne, there are three special administrative roles:
Role | Description |
---|---|
import_admin | Can manage all aspects of imports (including import sources, import sets, transform maps, and fieldsets). |
notification_admin | Can create and edit notification rules. |
impersonator | Can impersonate users. It does not allow impersonation of admin users. |
- No labels