Please enter search query.
Search <product_name> all support & community content...
Article: 100050005
Last Published: 2023-05-12
Ratings: 0 1
Product(s): Veritas Alta SaaS Protection
Description
Veritas Alta SaaS Protection includes Role-Based Access Control (RBAC) for managing authorization. After authenticating, all access, whether they be administrators, privileged users, or end-users, must pass this authorization layer before they are granted access in Veritas Alta SaaS Protection.
This article provides instructions on how to configure principals and roles, and explains the different permissions that can be applied.
Step 1 -- Navigate to Permission | Roles.
Click the '
Administration' tab and then click '
Permissions |
Roles'.
![](https://veritastech.custhelp.com/euf/assets/images/100050005/image-1683882778052.png)
Step 2 -- Create and Configure Roles
Using roles is optional. If you prefer to administer permissions on a per user or per group basis, skip to Step 3.
To create roles, click the '
Roles' tab and then click the '
New
Role' button.
![](https://veritastech.custhelp.com/euf/assets/images/100050005/image-1683882887044.png)
Clicking 'New Role' will display the ' Manage Role' window. Enter a name and optionally provide a description.
![](https://veritastech.custhelp.com/euf/assets/images/100050005/image-1683883172993.png)
Next, click the 'Manage Permissions' button and configure the desired permissions for the role and click on Save. For a detailed description of each permission, see
Definition of the Permissions in Veritas Alta SaaS Protection Authorization / RBAC Model.
![](https://veritastech.custhelp.com/euf/assets/images/100050005/image-1683883218033.png)
NOTE: You'll only need to consider the '
Securable Sub Object Permissions' tab if you select the '
eDiscovery App' permission. For more information, see
CONFIGURING AUTHORIZATION FOR EDISCOVERY.
Next, once the Role is saved, the click the '
Members | Add Members' button to add users and/or groups to the role. Click the blue checkbox beside the users / groups you wish to add to the role. When finished, click '
Save' to save the role.
![](https://veritastech.custhelp.com/euf/assets/images/100050005/image-1683883610733.png)
NOTE: In the 'Members' tab, you can click the column headers to sort. You can also search in the text box to quickly find the users / groups that you are looking for.
Step 3 -- (Optional) Configure Users / Groups Individually
Instead of, or in addition to, you can configure authorization from users / groups.
Click the ' Users and Groups' blade. Here you'll see a complete listing of all users and groups from your directory, in addition to automatically populated external users (from any external sharing) and shadow users. Use the column sorting feature, filtering, or search to find the principal(s) you wish to edit, then click the edit icon to configure their permissions and role membership(s).
Click the ' Users and Groups' blade. Here you'll see a complete listing of all users and groups from your directory, in addition to automatically populated external users (from any external sharing) and shadow users. Use the column sorting feature, filtering, or search to find the principal(s) you wish to edit, then click the edit icon to configure their permissions and role membership(s).
![](https://veritastech.custhelp.com/euf/assets/images/100050005/image-1683883870782.png)
Additional Information
Following are some other articles on authorization scenarios:
Configuring authorization for eDiscovery
How to configure external users in Veritas Alta SaaS Protection
How to configure Export Utility permissions
Configuring authorization for eDiscovery
How to configure external users in Veritas Alta SaaS Protection
How to configure Export Utility permissions