Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Overview

Information Security Analytics (ISA) uses a role-based user management mechanism.  On installation, the system creates one default user, Information Security Analytics Administratorthe ISA administrator.  Also, when new users are added to the system they can be assigned the "admin" administrator permissions.  The admin administrator role has access to the screens of the Information Security Analytics ISA interface and can perform all permitted Actions.  There is also the concept of the "Owner" permission that applies to Projects, and Data Groups.  The table below describes the resources that are assigned to the various roles in ISA.

TODO high level description of who does what. eg. admins use the Manager, and users create Projects for collaboration.

Resources Assigned to the Roles

A resource is the same thing as a web page, menu item or action that can be performed within the Information Security Analytics administration website.

ResourceFunctionalityAdminOwnerUser
ProjectsView ProjectsXOnly projects they are Owner/Member of Only projects they are Owner/Member of 
EditXX 
DeleteXX 
Project SettingsX  
UsersViewXUser sees list with no Add or EditUser sees list with no Add or Edit
AddX  
EditX  
User GroupsViewXUser sees User Groups they are member of with no Add or Edit User sees User Groups they are member of with no Add or Edit 
AddX  
EditX  
Data GroupsViewXUser sees only data groups they are Owner or Member with no Add User sees only data groups they are Owner or Member with no Add 
 AddX  
 EditXUser can edit data groups they are an Owner of (legacy)  
SourcesViewXUser can see list of sources they have access to or Owner ofUser can see list of sources they have access to or Owner of
 AddAdmin can add sources into any Data Group they are member ofUser can add source into Data Groups they are Owner/Member ofUser can add source into Data Groups they are Owner/Member of
 EditX  
 ActionsXUser can only perform actions on Sources they are Owner of User can only perform actions on Sources they are Owner of