How to Use Veritas Alta SaaS Protection Role Based Access Control (RBAC)

Article: 100050005
Last Published: 2023-05-12
Ratings: 0 1
Product(s): Veritas Alta SaaS Protection

Description

Veritas Alta SaaS Protection includes Role-Based Access Control (RBAC) for managing authorization. After authenticating, all access, whether they be administrators, privileged users, or end-users, must pass this authorization layer before they are granted access in Veritas Alta SaaS Protection.
 
This article provides instructions on how to configure principals and roles, and explains the different permissions that can be applied.

Step 1 -- Navigate to Permission | Roles.

Click the ' Administration' tab and then click ' Permissions |  Roles'.
 

Step 2 -- Create and Configure Roles

Using roles is optional. If you prefer to administer permissions on a per user or per group basis, skip to Step 3.
 
To create roles, click the ' Roles' tab and then click the ' New  Role' button.
 
 
NOTE: You'll notice that there is a 'Default' role. For information on this, see What is the 'Default' role in Veritas Alta SaaS Protection

Clicking 'New Role' will display the ' Manage Role' window. Enter a name and optionally provide a description.


 
Next, click the 'Manage Permissions' button and configure the desired permissions for the role and click on Save. For a detailed description of each permission, see Definition of the Permissions in Veritas Alta SaaS Protection Authorization / RBAC Model.
 
 
NOTE: You'll only need to consider the ' Securable Sub Object Permissions' tab if you select the ' eDiscovery App' permission. For more information, see CONFIGURING AUTHORIZATION FOR EDISCOVERY.
 
Next, once the Role is saved, the click the ' Members | Add Members' button to add users and/or groups to the role. Click the blue checkbox beside the users / groups you wish to add to the role. When finished, click ' Save' to save the role.
 

NOTE: In the 'Members' tab, you can click the column headers to sort. You can also search in the text box to quickly find the users / groups that you are looking for.

Step 3 -- (Optional) Configure Users / Groups Individually

Instead of, or in addition to, you can configure authorization from users / groups.

Click the ' Users and Groups'  blade. Here you'll see a complete listing of all users and groups from your directory, in addition to automatically populated external users (from any external sharing) and shadow users. Use the column sorting feature, filtering, or search to find the principal(s) you wish to edit, then click the edit icon to configure their permissions and role membership(s).
 
 

Was this content helpful?