Table of ContentsPreviousNextIndex
 
PDF

Fidelia Technology Logo

    Users and Departments

4.1 Security Model Overview

NetVigil's security model was designed to fit the needs of large scale enterprises. The multi-tiered administrative hierarchy allows enterprises and service providers to provide each group within the organization or service model the access it needs, and no more.

Note The security model is necessarily complex. We recommend that you read the overview in this chapter and review the case study before designing your own security model.

The following are examples of some roles that can be configured with different privileges:

In the diagrams in this chapter, icons represent the entities in the NetVigil security model:

Key to Security Model Diagrams

This diagram illustrates the NetVigil security model. The components of the security model are described in detail in the sections that follow.

NetVigil Security Model

4.1.1 End-users and Departments

At the bottom of the NetVigil administrative hierarchy is the end-user. Each end-user is a member of a single Department. Departments can reflect divisions within the company (e.g., PAYROLL), locations (e.g., DENVER), or other meaningful categories.

End-users with full permissions can create/delete, read, update, and suspend/resume the following: devices, tests, actions, and SNMP Traps. In addition to the tasks listed in the privileges matrix (described in Section 4.1.2, "User-Classes and Privileges" on page 4-68), end-users can also

End-users from one Department cannot view data belonging to another Department. (An exception to this is an exported device and the tests associated with it. For information on exporting devices, see "To move a device from one Department to another:" on page 81).

4.1.2 User-Classes and Privileges

Each Department is associated with a single User-Class, which determines what privileges members of the Department have. Privileges control which tasks an end-user can perform with respect to various NetVigil entities.

In the User-Class privileges matrix that follows, each cell represents a single task/entity combination, with column headers specifying the task and row headers specifying the entity. For example, the X in the first cell of the first row means that end-users in this group can Create and Delete Devices. The X in the third cell of the second row means that end-users can Update Tests.

User-Class Privileges Matrix
Access Privileges
Create/
Delete
Read
Update
Suspend/
Resume
Devices
X
 
 
 
Tests
 
 
X
 
Actions
 
 
 
 
SNMP Trap Actions
 
 
 
 

Note When an end-user is created, it is assigned a role: either Read-Only, or Read-Write. Read-Write end-users have the privileges that are assigned to their Department's User-Class. However, the Read-Only role supersedes the User-Class privilege matrix. In other words, if an end-user is Read-Only, they cannot create, modify, etc. even if their User-Class has the privileges to do so.

Note When you create User-Classes, consider two factors: The privileges of each set of end-users, and how the end-users will be administered. To give some users limited NetVigil privileges while others have full privileges, you must create separate User-Classes for each privilege level. Likewise, if two sets of users have the same NetVigil privileges, but you want each set to be administered by a separate Admin-Group, you must create separate User-Classes that can be mapped to the Admin-Classes. (For information on Administrators see Section 4.1.3, "Administrators and Admin-Groups" on page 4-69 and Section 4.1.4, "Admin-Classes and User-Class Mapping" on page 4-70.)

4.1.3 Administrators and Admin-Groups

Some administrative tasks can't be done by end-users. These tasks are done by Administrators, who are members of Admin-Groups. Unlike end-users, Administrators can have visibility across Departments.

Each Administrator is a member of a single Admin-Group. Admin-Groups can reflect divisions within the company (e.g., NOC), locations (e.g., DENVER-ADMIN), or other meaningful categories.

Members of an Admin-Class that has full permissions with respect to a User-Class can do everything specified in the mappings matrix for entities belonging to the User-Class. (Mapping matrices are described in Section 4.1.4, "Admin-Classes and User-Class Mapping" on page 4-70.) In addition to the tasks listed in the mapping matrix, Administrators can also

Administrators can NOT do the following, unless they represent an end-user:

Unlike End-User Departments, Admin-Groups do not own devices and tests.

4.1.4 Admin-Classes and User-Class Mapping

Each Admin-Group is associated with one Admin-Class, which determines what privileges members of the Admin-Group have with respect to specific User-Classes. More precisely, privileges control which tasks members of an Admin-Group can perform with respect to entities belonging to the Departments associated with specific User-Classes.

An Admin-Class to User-Class Mapping Matrix determines which tasks one Admin-Class can perform with respect to one User-Class. In order to control three separate User-Classes, an Admin-Class requires three separate mapping matrices.

The relationship between Admin-Classes and User-Classes is a many-to-many relationship. That is, a single Admin-Class can control multiple User-Classes, and a single User-Class can be controlled by multiple Admin-Classes.

In the Admin-Class to User-Class Mapping matrix that follows, each cell represents a single task/entity combination. Assuming that the Admin-Class represented is called ADMIN, and the User-Class is USER, the X in the first cell of the first row means that members of Admin-Groups associated with ADMIN can Create and Delete Devices for Departments associated with USER. The X in the third cell of the fifth row means that ADMIN can Update Departments for USER.

User-Class Mapping Matrix
Access Privileges
Create/
Delete
Read
Update
Suspend/
Resume
Devices
X
 
 
 
Tests
 
 
 
 
Actions
 
 
 
 
SNMP Trap Actions
 
 
 
 
Departments
 
 
X
 
End-users
 
 
 
 
Service Classes
 
 
 
 

Note When an Administrator is created, it is assigned a role: either Read-Only, or Read-Write. Read-Write Administrators have the privileges that are assigned to their Admin-Group's Admin-Class. However, the Read-Only role supersedes the Admin-Class to User-Class Mapping matrix. In other words, if an Administrator is Read-Only, they cannot create, modify, etc. even if their Admin-Class has the privileges to do so.

Note When you create Admin-Classes, consider two factors: The privileges of each set of Administrators, and how the end-users will be administered. To give some Administrators limited NetVigil privileges while others have full privileges, you must create a separate Admin-Class for each privilege level. Likewise, if two sets of Administrators have the same NetVigil privileges, but each set will administer different end-users, you must create discrete Admin-Classes that can be mapped to separate User-Classes. (For information on User-Classes, see Section 4.1.2, "User-Classes and Privileges" on page 4-68.)

4.1.5 Superusers

At the top of the NetVigil security hierarchy is the Superuser. Superusers, who are members of the Superuser-Group, have complete access to all entities in the system and perform tasks that cannot be done by end-users or Administrators. For security reasons, the number of Superusers should be as small as possible.

A Superuser can do the following:

A superusers can NOT do the following, unless they represent an end-user:

Unlike end-user Departments, The Superuser-Group does not own devices and tests.

4.2 Putting it all Together: A Case Study

The sections that follow show how a complex administrative hierarchy can be implemented in NetVigil.

Case Study: End-users and Departments

Acme Corporation has two corporate divisions:

Paul, Parag, Helen, Henry, and the other employees of Acme are all end-users.

Within the NetVigil administrative hierarchy, one Department is set up for each corporate subdivision:

Case Study: User-Classes and Privileges

To allow the Finance and Engineering divisions within the company to be administered separately, two User-Classes are created:

Privileges are configured so that end-users associated with these User-Classes have full read and write privileges over all NetVigil entities. That is, they can create their own devices, run and suspend tests, etc., and they can view data created by others within their Departments.

End-users cannot view data belonging to other Departments, so members of PAYROLL cannot check the status of tests for a server that belongs to DEVL.

Case Study: Administrators and Admin-Groups

Acme Corporation has two IT divisions, one for each of the main corporate divisions:

Each IT division is responsible for daily maintenance of the networks and equipment of two corporate subdivisions, represented in NetVigil by two distinct Departments. To give Frank and Elizabeth access to data across Departments, two Admin-Groups are set up, one for each IT division:

Acme also has a NOC group, which handles network troubleshooting, security, etc. for the entire company. Members of the NOC need access to all networks within the company.

Lastly, Acme's CTO and CIO want to run custom reports to check network usage by cost center, make predictions about future hardware costs, etc. While they need access to data from all Departments, they don't need to manage Departments or entities belonging to Departments.

Case Study: Admin-Class to User-Class Mapping

All Admin-Groups associated with the same Admin-Class have the same level of control over the same User-Classes. In Acme Corporation, each Admin-Group has separate access requirements, so it is necessary to create a separate Admin-Class for each one:

Case Study Diagram

For the key to icons used in this diagram, see Section 4.1, "Security Model Overview" on page 4-65.

4.3 Managing the Security Model

4.3.1 Managing User-Classes

Only a superuser can create, update, and delete User-Classes.

Configuring a new User-Class involves the following tasks:

  1. Create and name the User-Class
  2. Define privileges and limits for end-users in the group. (For an explanation of the privileges matrix, see Section 4.1.2, "User-Classes and Privileges" on page 4-68.)

The instructions that follow describe these tasks in detail.

Managing User Classes
Note User-Classes can also be created by importing a configuration file via the socket server (see Chapter 17, "BVE FlexAPI Protocol Reference" for details).
  1. Login to NetVigil as a superuser.
  2. Click SUPERUSER | user class.
  3. On the User Classes page, click Create a New User Class.
  4. Fill in the Name field with a unique User-Class name. Optionally, enter a comment in the area provided.
  5. Click Create User Class.
  6. Step 2: Define User-Class Privileges and Limits
  7. Login to NetVigil as a superuser.
  8. Click MANAGE | user class.
  9. On the Manage User Classes page, find the User-Class for which you want to define privileges and click the Privileges link in the Update Settings For column.
  10. Select the access privileges that you want to enable for this User-Class. (For an explanation of the privileges matrix, see Section 4.1.2, "User-Classes and Privileges" on page 4-68.)
  11. Select the limit for Minimum Test Interval.
  12. Set the maximum limits for adding devices, reports, action profiles, and tests (use integers greater than or equal to 1, or type in unlimited).
  1. Click Update Privileges to save your changes.
Setting limits and priveleges for a User Class

4.3.2 Managing Departments

NetVigil's security/administration model is done using a combination of Department and user entities. Departments can have a single end-user, or multiple end-users. To add a new end-user to the system, you need to first create a Department and then create an end-user. For convenience, NetVigil auto-generates a default end-user for each Department created. The name of the auto-generated end-user defaults to the Department name, and the password is e-mailed to the contact e-mail address on the Department.

Service Providers can integrate the system with their customer provisioning systems, and set up new Departments automatically. In addition, lists of Departments and end-users can be imported into the system via the BVE Socket Protocol to facilitate this process (see Chapter 17, "BVE FlexAPI Protocol Reference" for details).

Creating a new Department

All of the data and provisioning information for the device are moved to the Destination Department.

Provisioning information for the device and exported tests are available to the Destination Department. The Destination Department can configure new tests for the device.

4.3.3 Managing End-Users

4.3.4 Managing Admin-Classes

Only a superuser can create, update, and delete Admin-Classes.

Configuring a new Admin-Class involves the following tasks:

  1. Create and name the Admin-Class
  2. Map the Admin-Class to those User-Classes that it will control, defining separate privileges for each User-Class. (For an explanation of mapping matrices, see Section 4.1.4, "Admin-Classes and User-Class Mapping" on page 4-70.)

The instructions that follow describe these tasks in detail.

Note Admin-Classes can also be created by importing a configuration file via the socket server (see Chapter 17, "BVE FlexAPI Protocol Reference" for details).
  1. Login to NetVigil as a superuser.
  2. Click SUPERUSER | admin class.
  3. On the Admin Classes page, click Create a New Admin Class.
  4. Fill in the Name field with a unique Admin-Class name. Optionally, enter a comment in the area provided.
  5. Click Create Admin Class.
Creating an Admin Class
Note: Creation of User-Class/Admin-Class relationships and privileges is complex and requires a thorough understanding of the NetVigil Security Model. For a detailed description of the security model, see Section 4.1, "Security Model Overview" on page 4-65.
  1. Click SUPERUSER | admin class.
  2. On the Admin Classes page, find the Admin-Class for which you want to create a User-Class Mapping and click User-Class Mappings.
  3. On the User Class Mappings page, click Assign User Class to Admin Class.
  4. On the Create User Class Mapping page, select a User-Class from the Name list, and the click Create User-Class Mapping.
  5. On the User-Class Privileges page, select access privileges using the check boxes provided. (For information about the Admin-Class to User-Class mapping matrix, see Section 4.1.4, "Admin-Classes and User-Class Mapping" on page 4-70.)
  6. Click Update Privileges. Note that once a User-Class is assigned to an Admin-Class, that User-Class is no longer available for assignment to a different Admin-Class.
Assigning Admin-Class priveleges over User-Class

4.3.5 Managing Admin-Groups

For each Admin-Group, a default Administrator is created. The username for the default Administrator is the same as the name of the Admin-Group. This information and the Administrator's password are E-mailed to the Contact E-mail Address defined when the Admin-Group is created. You can also create additional Administrators, as described in "To create a new Administrator:" on page 87.

4.3.6 Managing Administrators

See "To update a user:" on page 82.

See "To delete a user:" on page 83.

4.3.7 Representing Users

NetVigil enables Administrators to log in as if they were the end-user they are supporting. This is called representing an end-user. An Administrator who is representing an end-user is logged into the end-user's Department, with access to the Department's devices, tests, etc., while still retaining Administrator privileges.

This is especially helpful when an end-user has read-only capabilities and requests some type of Department modification. The Administrator can log in as Administrator, represent the end-user, and make any needed additions or modifications to devices, tests, actions, user profile or password.

NOTE Do not use your browser's Back button to return to the administrator interface. You must log out and log in again to re-initiate your administrator session.


Fidelia Technology, Inc.
Contact Us
Table of ContentsPreviousNextIndex