Skip to content

Role-based access control

Steps to be followed in Role-Based Access Control

Select the Workspace Manager > Role-Based Access Control. This is the second subsection of workspace manager. This subsection is used to assign the existing roles access permissions, or you can create new roles. This subsection is divided into 7 stages,

  • Cluster Management
  • Policy Management
  • Account Management
  • Data Protection
  • Anomaly Detection
  • User Management
  • Data Pipeline

Step 1 - User Management

Select the Workspace Manager -> Role-Based Access Control > User Management stage. This stage is used to assign the existing roles access permissions for Users in granular level.

Here you can use existing roles or you can create custom roles. Click the Create Custom Role button.

It will show Create a New Role dialog box. Here you can see two input fields. First field enter your New custom role name then the second field click the dropdown box and select your role type and Click Next button.

Now you have to set Granular Roles for your new custom role then click the Save button.

Once you click the save button It will show the confirmation dialog box. Here you have two options: Cancel and Create.

If you don’t want to create a new role then click the Cancel button, Otherwise click the Create button it will create your new custom role.

Step 2 - Cluster Management

Select the Workspace Manager -> Role-Based Access Control > Cluster Management stage. This stage is used to assign the existing roles access permissions for Cluster Management. Here you can also create custom roles for Policy Management.

Step 3 - Policy Management

Select the Workspace Manager > Role-Based Access Control -> Policy Management stage. This stage is used to assign the existing roles access permissions for Policy Management. Here you can also create custom roles for Policy Management.

Step 4 - Account Management

Select the Workspace Manager -> Role-Based Access Control -> Account Management stage. This stage is used to assign the existing roles access permissions for Account Management. Here you can also create custom roles for Account Management.

Step 5 - Data Protection

Select the Workspace Manager -> Role-Based Access Control -> Data Protection stage. This stage is used to assign the existing roles access permissions for Data Protection. Here you can also create custom roles for Data Protection.

Step 6 - Anomaly Detection

Select the Workspace Manager -> Role-Based Access Control -> Anomaly Detection stage. This stage is used to assign the existing roles access permissions for Anomaly Detection. Here you can also create custom roles for Anomaly Detection.

Step 7 - Data Pipeline

Select the Workspace Manager -> Role-Based Access Control -> Data Pipeline stage. This stage is used to assign the existing roles access permissions for Data Pipeline. Here you can also create custom roles for Data Pipeline.

Back to top