Define roles for users

Deep Security uses role-based access control (RBAC) to restrict user permissions to parts of Deep Security. Access rights and editing privileges are attached to roles and not to users. Once you have installed Deep Security Manager, you should create individual accounts for each user and assign each user a role that will restrict their activities to all but those necessary for the completion of their duties. To change the access rights and editing privileges of an individual user, you must assign a different role to the user or edit the role.

The access that roles have to computers and policies can be restricted to subsets of computers and policies. For example, users can be permitted to view all existing computers, but only permitted to modify those in a particular group.

Deep Security comes preconfigured with two roles:

  • Full Access: The full access role grants the user all possible privileges in terms of managing the Deep Security system including creating, editing, and deleting computers, computer groups, policies, rules, malware scan configurations, and others.
  • Auditor: The auditor role gives the user the ability to view all the information in the Deep Security system but without the ability to make any modifications except to their own personal settings, such as password, contact information, dashboard layout preferences, and others.
Depending on the level of access granted, controls in Deep Security Manager will be either visible and changeable, visible but disabled, or hidden. For a list of the rights granted in the preconfigured roles, as well as the default rights settings when creating a new role, see Default settings for full access, auditor, and new roles.

You can create new roles that can restrict users from editing or even seeing Deep Security objects such as specific computers, the properties of security rules, or the system settings.

Before creating user accounts, identify the roles that your users will take and itemize what Deep Security objects those roles will require access to and what the nature of that access will be (viewing, editing, creating, and so on). Once you have created your roles, you can then begin creating user accounts and assigning them specific roles.

Do not create a new role by duplicating and then modifying the full access role. To ensure that a new role only grants the rights you intend, create the new role by clicking New in the toolbar. The rights for a new role are set at the most restrictive settings by default. You can then proceed to grant only the rights that are required. If you duplicate the full access role and then apply restrictions, you risk granting some rights that you did not intend.

Clicking New () or Properties () displays the Role properties window with six tabs (General, Computer Rights, Policy Rights, User Rights, Other Rights, and Assigned To).

Add or edit a role

  1. In Deep Security Manager go to Administration > User Management > Roles.
  2. Click New to add a new role or double-click an existing role to edits its settings.
  3. Specify the general properties for the role, including:
    • Name: The name of the role, which will appear on the Roles page and in the list of available roles when adding a user.
    • Description: (Optional) A description of the role.
    • Access Type: Select whether users with this role will have access to Deep Security Manager, the Deep Security Manager Web service API (applies to the legacy SOAP and REST APIs), or both.
    • To enable the legacy SOAP and REST Web service APIs, go to Administration > System Settings > Advanced > SOAP Web Service API.
  4. Use the Computer Rights pane to confer viewing, editing, deleting, alert-dismissal, and event tagging rights to users in a role. These rights can apply to all computers and computer groups or they can be restricted to only certain computers. If you wish to restrict access, select the Selected Computers radio button and put a check next to the computer groups and computers that users in this role will have access to.

  5. These rights restrictions will affect not only the user's access to computers in Deep Security Manager, but also what information is visible, including events and alerts. As well, email notifications will only be sent if they relate to data that the user has access rights to.

    Four basic options are available:

    • Allow viewing of non-selected computers and data: If users in this role have restricted edit, delete, or dismiss-alerts rights, you can still allow them to view but not change information about other computers by checking this box.
    • Allow viewing of events and alerts not related to computers: Set this option to allow users in this role to view non-computer-related information (for example, system events, like users being locked out, new firewall rules being created, IP Lists being deleted, and so on)
      The previous two settings affect the data that users have access to. Although the ability of a user to make changes to computers have been restricted, these two settings control whether they can see information relating to computers they don't otherwise have access to. This includes receiving email notifications related to those computers.
    • Allow new computers to be created in selected Groups: Set this option to allow users in this role to create new computers in the computer groups they have access to.
    • Allow sub-groups to be added/removed in selected Groups: Set this option to allow users in this role to create and delete subgroups within the computer groups they have access to.

    You can also enabled these in the Advanced Rights section:

    • Allow computer file imports: Allow Users in this Role to import computers using files created using the Deep Security Manager's Computer Export option.
    • Allow Directories to be added, removed and synchronized: Allow Users in this Role to add, remove, and synchronize computers that are being managed using an LDAP-based directory like MS Active Directory.
    • Allow VMware vCenters to be added, removed and synchronized: Allow Users in this Role to add, remove and synchronize VMware vCenters. (Not available with Deep Security as a Service)
    • Allow Cloud Providers to be added, removed, and sychronized: Allow Users in this Role to add, remove, and synchronize Cloud Providers. (Not available with Deep Security as a Service)
  6. Use the Policy Rights tab to confer viewing, editing, and deleting rights to users in a role. These rights can apply to all policies or they can be restricted to only certain policies. If you wish to restrict access, click Selected Policies and put a check mark next to the policies that users in this role will have access to.

    When you allow rights to a policy that has "child" policies, users automatically get rights to the child policies as well.

    Two basic options are available:

    • Allow viewing of non-selected Policies: If users in this role have restricted edit or delete rights, you can still allow them to view but not change information about other policies by checking this box.
    • Allow new Policies to be created: Set this option to allow users in this role to create new policies.

    You can also enabled this in the Advanced Rights section:

    • Allow Policy imports: Allow users in this role to import policies using files created with the Deep Security Manager Export option on the Policies tab.
  7. The options on the User Rights tab allow you to define permissions for administrator accounts.

    • Change own password and contact information only: Users in this role can change their own password and contact information only.
    • Create and manage Users with equal or less access: Users in this role can create and manage any users who do not have any privileges greater than theirs. If there is even a single privilege that exceeds those of the users with this role, the users with this role will not be able to create or manage them.
    • Have full control over all Roles and Users: Gives users in this role the ability to create and edit and users or roles without restrictions. Be careful when using this option. If you assign it to a role, you may give a user with otherwise restricted privileges the ability to create and then sign in as a user with full unrestricted access to all aspects of the Deep Security Manager.
    • Custom: You can further restrict the ability of a user to view, create, edit, or delete users and roles by selecting Custom and using the options in the Custom Rights section. Some options may be restricted for certain users if the Can only manipulate Users with equal or lesser rights option is selected.

      The Can only manipulate Users with equal or lesser rights option limits the authority of users in this role. They will only be able to effect changes to users that have equal or lesser rights than themselves. Users in this Role will not be able to create, edit, or delete roles. Selecting this option also places restrictions on some of the options in the Custom Rights section:

      • Can Create New Users: Can only create users with equal or lesser rights.
      • Can Edit User Properties: Can only edit a user (or set or reset password) with equal or lesser rights.
      • Can Delete Users: Can only delete users with equal or lesser rights.
  8. The Other Rights tab enables you to restrict roles' permissions so that they can only access specific Deep Security features, and sometimes specific actions with those features. This can be useful if, for example, you have a team of administrators, and you want to make sure that they don't accidentally overwrite each others' work. By default, roles are View Only or Hide for each feature. To allow to full control or customized access, select Custom from the list.
  9. The Assigned To tab displays a list of the users who have been assigned this role. If you want to test that roles are working correctly, sign in as a newly created user and verify the functionality.

 

Default settings for full access, auditor, and new roles

The following table identifies the default rights settings for the full access role and the auditor role. Also listed are the rights settings that are in place when creating a new role by clicking New in the toolbar on the Roles page.

RIGHTSSETTINGS BY ROLE
GeneralFull Access RoleAuditor RoleNew Role Defaults
Access to DSM User InterfaceAllowedAllowedAllowed
Access to Web Service APIAllowedAllowedNot allowed
Computer RightsFull Access RoleAuditor RoleNew Role Defaults
ViewAllowed, All ComputersAllowed, All ComputersAllowed, All Computers
EditAllowed, All ComputersNot allowed, All ComputersNot allowed, All Computers
DeleteAllowed, All ComputersNot allowed, All ComputersNot allowed, All Computers
Dismiss Alerts forAllowed, All ComputersNot allowed, All ComputersNot allowed, All Computers
Tag Items forAllowed, All ComputersNot allowed, All ComputersNot allowed, All Computers
Allow viewing of non-selected computers and data (e.g. events, reports)AllowedAllowedAllowed, All Computers
Allow viewing of events and alerts not related to computersAllowedAllowedAllowed, All Computers
Allow new computers to be created in selected GroupsAllowedNot allowedNot allowed
Allow sub-groups to be added or removed in selected GroupsAllowedNot allowedNot allowed
Allow computer file importsAllowedNot allowedNot allowed
Allow Cloud Accounts to be added, removed and synchronizedAllowedNot allowedNot allowed
Policy RightsFull Access RoleAuditor RoleNew Role Defaults
ViewAllowed, All PoliciesAllowed, All PoliciesAllowed, All Policies
EditAllowed, All PoliciesNot allowed, All PoliciesNot allowed, All Policies
DeleteAllowed, All PoliciesNot allowed, All PoliciesNot allowed, All Policies
View non-selected PoliciesAllowedAllowedAllowed
Create new PoliciesAllowedNot allowedNot allowed
Import PoliciesAllowedNot allowedNot allowed
User Rights (See note on User rights below)Full Access RoleAuditor RoleNew Role Defaults
View UsersAllowedAllowedNot allowed
Create UsersAllowedNot allowedNot allowed
Edit User PropertiesAllowedNot allowedNot allowed
Delete UsersAllowedNot allowedNot allowed
View RolesAllowedAllowedNot allowed
Create RolesAllowedNot allowedNot allowed
Edit Role PropertiesAllowedNot allowedNot allowed
Delete RolesAllowedNot allowedNot allowed
Delegate AuthorityAllowedNot allowedNot allowed
Other RightsFull Access RoleAuditor RoleNew Role Defaults
AlertsFull (Can Dismiss Global Alerts)View-OnlyView-Only
Alert ConfigurationFull (Can Edit Alert Configurations)View-OnlyView-Only
IP ListsFull (Can Create, Edit, Delete)View-OnlyView-Only
Port ListsFull (Can Create, Edit, Delete)View-OnlyView-Only
SchedulesFull (Can Create, Edit, Delete)View-OnlyView-Only
System Settings (Global)Full (Can View, Edit System Settings (Global))View-OnlyHide
DiagnosticsFull (Can Create Diagnostic Packages)View-OnlyView-Only
TaggingFull (Can Tag (Items not belonging to Computers), Can Delete Tags, Can Update Non-Owned Auto-Tag Rules, Can Run Non-Owned Auto-Tag Rules, Can Delete Non-Owned Auto-Tag Rules)View-OnlyView-Only
TasksFull (Can View, Add, Edit, Delete Tasks, Execute Tasks)View-OnlyHide
Multi-Tenant AdministrationFullHideView-Only
Scan Cache Configuration AdministrationFullView-OnlyView-Only
ContactsFull (Can View, Create, Edit, Delete Contacts)View-OnlyHide
LicensesFull (Can View, Change License)View-OnlyHide
UpdatesFull (Can Add, Edit, Delete Software; Can View Update For Components; Can Download, Import, Apply Update Components; Can Delete Deep Security Rule Updates)View-OnlyHide
Asset ValuesFull (Can Create, Edit, Delete Asset Values)View-OnlyView-Only
CertificatesFull (Can Create, Delete SSL Certificates)View-OnlyView-Only
Relay GroupsFullView-OnlyView-Only
ProxyFullView-OnlyView-Only
SAML Identity ProvidersFullHideHide
Malware Scan ConfigurationFull (Can Create, Edit, Delete Malware Scan Configuration)View-OnlyView-Only
Quarantined FileFull (Can Delete, Download Quarantined File)View-OnlyView-Only
Web Reputation ConfigurationFullView-OnlyView-Only
Directory ListsFull (Can Create, Edit, Delete)View-OnlyView-Only
File ListsFull (Can Create, Edit, Delete)View-OnlyView-Only
File Extension ListsFull (Can Create, Edit, Delete)View-OnlyView-Only
Firewall RulesFull (Can Create, Edit, Delete Firewall Rules)View-OnlyView-Only
Firewall Stateful ConfigurationsFull (Can Create, Edit, Delete Firewall Stateful Configurations)View-OnlyView-Only
Intrusion Prevention RulesFull (Can Create, Edit, Delete)View-OnlyView-Only
Application TypesFull (Can Create, Edit, Delete)View-OnlyView-Only
MAC ListsFull (Can Create, Edit, Delete)View-OnlyView-Only
ContextsFull (Can Create, Edit, Delete)View-OnlyView-Only
Integrity Monitoring RulesFull (Can Create, Edit, Delete)View-OnlyView-Only
Log Inspection RulesFull (Can Create, Edit, Delete)View-OnlyView-Only
Log Inspection DecodersFull (Can Create, Edit, Delete)View-OnlyView-Only

The custom settings corresponding to the Change own password and contact information only option are listed in the following table:

Custom settings corresponding to "Change own password and contact information only" option
Users
Can View UsersNot allowed
Can Create New UsersNot allowed
Can Edit User Properties (User can always edit select properties of own account)Not allowed
Can Delete UsersNot allowed
Roles
Can View RolesNot allowed
Can Create New RolesNot allowed
Can Edit Role Properties (Warning: conferring this right will let Users with this Role edit their own rights)Not allowed
Can Delete RolesNot allowed
Delegate Authority
Can only manipulate Users with equal or lesser rightsNot allowed


The custom settings corresponding to the Create and manage Users with equal or less access option are listed in the following table:

Custom settings corresponding to "Create and manage Users with equal or less access" option
Users
Can View UsersAllowed
Can Create New UsersAllowed
Can Edit User Properties (User can always edit select properties of own account)Allowed
Can Delete UsersAllowed
Roles
Can View RolesNot allowed
Can Create New RolesNot allowed
Can Edit Role Properties (Warning: conferring this right will let Users with this Role edit their own rights)Not allowed
Can Delete RolesNot allowed
Delegate Authority
Can only manipulate Users with equal or lesser rightsAllowed


The custom settings corresponding to the Have full control over all Roles and Users option are listed in the following table:

Custom settings corresponding to "Have full control over all Roles and Users" option
Users
Can View UsersAllowed
Can Create New UsersAllowed
Can Edit User Properties (User can always edit select properties of own account)Allowed
Can Delete UsersAllowed
Roles
Can View RolesAllowed
Can Create New RolesAllowed
Can Edit Role Properties (Warning: conferring this right will let Users with this Role edit their own rights)Allowed
Can Delete RolesAllowed
Delegate Authority
Can only manipulate Users with equal or lesser rightsNot applicable