Typical Role Scenarios and Required Privileges¶
Tab-Level Access Control Matrix¶
This section provides a comprehensive overview of the privileges and/or capabilities required to access and perform actions within each part of the Fudo Enterprise user interface.
Each table corresponds to a top-level tab in the system. Depending on the complexity of the tab, the table may include:
Subsection: A nested component or feature within the tab (e.g., “General > Date Time” under the System tab).
Action: The specific operation (e.g., visible, create, configure) that can be controlled via access rights.
Privileges: The required privilege(s) for a user to perform the action.
Capabilities: If applicable, additional capability requirements are listed. If none are required, this column displays None.
Access control in the system is enforced based on a user’s assigned roles, which in turn grant privileges and capabilities as needed.
Note
Assigned capabilities for specific objects may cause certain tabs to appear in the UI, even if the user does not have the required privileges to perform any actions within those tabs.
Some advanced tabs, such as Safes, require more than their own privileges (e.g.,
safe-read,safe-create). To fully create or manage a Safe, a user must also have privileges to view and select related resources—such as accounts, servers, pools, or groups—that are part of the Safe configuration.
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
backup |
|
None |
delete |
|
None |
download |
|
None |
encode |
|
None |
retention |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
create |
|
None |
modify |
|
None |
delete |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
|
create |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
|
create |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
|
create |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
|
create |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
|
create |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
create |
|
None |
modify |
|
None |
delete |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
Safes |
|||
visible |
|
|
|
create |
|
None |
|
Notifications |
|||
visible |
|
None |
|
create |
|
None |
|
delete |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
Scanners |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
|
start |
|
None |
|
Rules |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
Password Changer |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
|
Password Policy |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
create |
|
None |
modify |
|
None |
delete |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
Policy |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
|
Regexp |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
Files |
|||
visible |
|
None |
|
download |
|
None |
|
delete |
|
None |
|
Movies |
|||
visible |
|
None |
|
download |
|
None |
|
delete |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
create |
|
None |
modify |
|
None |
delete |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
General > Date Time |
|||
visible |
|
None |
|
configure |
|
None |
|
General > NTP |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Certificates |
|||
visible |
|
None |
|
General > Certificates > Fudo Admin Panel |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Certificates > User Access Gateway |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Certificates > User CA |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Maintenance Supervision > Deny New Connections |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Maintenance Supervision > Tech Support Access |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Maintenance Supervision > Healthcheck Api |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Maintenance Supervision > Callhome |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Masterkey |
|||
visible |
|
None |
|
export |
|
None |
|
invalidate |
|
None |
|
General > Snmp |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Timestamping |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Changers |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Discovery |
|||
visible |
|
None |
|
configure |
|
None |
|
General > Sensitive Features |
|||
visible |
|
None |
|
configure |
|
None |
|
General > HTTP Proxy |
|||
visible |
|
None |
|
configure |
|
None |
|
Upgrade |
|||
visible |
|
None |
|
upload |
|
None |
|
check |
|
None |
|
install |
|
None |
|
delete |
|
None |
|
snapshot-delete |
|
None |
|
Hotfix |
|||
visible |
|
None |
|
upload |
|
None |
|
install |
|
None |
|
delete |
|
None |
|
License |
|||
visible |
|
None |
|
configure |
|
None |
|
Diagnostic |
|||
visible |
|
None |
|
Configuration > Export |
|||
visible |
|
None |
|
Configuration > Import |
|||
visible |
|
None |
|
Configuration > Service Data |
|||
visible |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
Interfaces |
|||
visible |
|
None |
|
configure |
|
None |
|
DNS |
|||
visible |
|
None |
|
configure |
|
None |
|
Routing |
|||
visible |
|
None |
|
configure |
|
None |
|
ARP |
|||
visible |
|
None |
|
configure |
|
None |
|
Labels |
|||
visible |
|
None |
|
configure |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
configure |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
configure |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
configure |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
External |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
|
Openid Connect |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
|
Global |
|||
visible |
|
None |
|
configure |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
create |
|
None |
modify |
|
None |
delete |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
Protocols |
|||
visible |
|
None |
|
configure |
|
None |
|
User Portal |
|||
visible |
|
None |
|
configure |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
Backup |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
|
Retention |
|||
visible |
|
None |
|
configure |
|
None |
Subsection |
Action |
Privileges |
Capabilities |
|---|---|---|---|
Nodes |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
|
cluster_create |
|
None |
|
cluster_join |
|
None |
|
Redundancy Groups |
|||
visible |
|
None |
|
create |
|
None |
|
modify |
|
None |
|
delete |
|
None |
|
failover |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
create |
|
None |
modify |
|
None |
delete |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
Action |
Privileges |
Capabilities |
|---|---|---|
visible |
|
None |
Dashboard Widgets Visibility¶
The visibility of individual widgets on the Dashboard depends on the following privileges:
Privilege |
Description |
Corresponding Widget |
|---|---|---|
|
Allows accessing the Dashboard tab |
Dashboard tab visibility |
|
Allows viewing the list of accounts and account details |
Account Alerts |
|
Allows viewing the users list and user details |
Active Users |
|
Allows viewing the list of sessions and session details |
Suspicious Sessions, New Sessions, Concurrent Sessions |
|
Allows previewing the Configuration tab |
License |
|
Allows viewing the events log |
Logs |
|
Allows viewing cluster configuration |
Node |
If the user has a capability to any user or account and the dashboard global privilege assigned, they will also see the Active Users and Account Alerts widgets, respectively.
Note
When the user’s role changes, some widgets may move to the Dashlet’s Market. To make them visible again, check the market and add the widgets back to the Dashboard if needed.
Sessions Tab Permissions¶
To view and interact with the Sessions tab, the user must have the following privileges:
session-view
session-read
In addition, to see a specific session on the list, the user must have read access to all objects associated with the session:
The user involved in the session,
The corresponding server,
The account used,
The related safe (if applicable).
Playback and Preview¶
To view or play back a session, the following privileges are required:
user-session-view
session-view
session-readRead access to all associated objects (user, server, account, safe)
Session Backup¶
The session-backup privilege allows sending a session to backup.
This action does not modify the session, which is why it is handled with a dedicated privilege.
Session Management¶
The session-modify privilege grants access to advanced session management operations.
Users with this privilege can perform the following actions for sessions they have access to:
Restore a session from backup,
Download files transferred via SCP or SFTP,
Approve or reject a session if the require approval option is enabled in the safe,
Send the session to other nodes,
Revoke session sharing,
Modify editable session attributes,
Modify session timestamps.
Downloads Tab Permissions¶
Access to the Downloads tab, which allows users to retrieve session-related files (such as session recordings and transferred files), is governed by the following privileges:
session-*
session-file-*
session-movie-*
However, privileges from the following groups alone do not grant access to all sessions globally. In order to view and download files from a specific session, the user must also have access rights to all objects associated with that session, including:
the user who initiated the session,
the target server,
the account used, and
the safe in which these objects are stored.
These object-level access rights can be granted either through dedicated global privileges or via appropriate capability assignments.
Safes Management¶
Note
To manage accounts in safes, the user must have at least the listener-read privilege from the Listener privileges list, regardless of their existing permissions for the accounts themselves.
To create a safe, the following minimum privileges are required:
safe-read
safe-create
safe-user-add
user-read
account-read
listener-read
Additionally, the following privileges are required for specific actions:
To assign groups to the safe:
group-read
To manage notifications:
notification-filter-readnotification-filter-createnotification-filter-delete
To assign policies:
policy-read
Discovery Tab Permissions¶
To fully manage the Discovery tab it is required to have all below tab related privileges:
scanner-read
scanner-create
scanner-modify
scanner-delete
scanner-start
discovery-rule-read
discovery-rule-create
discovery-rule-modify
discovery-rule-delete
listener-read
server-read
account-read
password-changer-read
password-change-policy-read
Note
Please note that to view the list of Discovery rules in the Discovery tab, the listener-read privilege is also required.
To access the Discovery node settings (System > General > Discovery), the user needs the following privileges:
discovery-node-read
discovery-node-modify
cluster-read
Access Request Permissions¶
To vote on an Access Request, a user must meet the following conditions:
Have the
access-request-readprivilege – grants access to the Requests tab.Have the
access-request-voteprivilege – grants the ability to vote on requests.Have
readpermissions for the following objects related to the request: - User – the requesting user. - Safe – the safe containing the requested account. - Account – the account the request concerns.
Proper configuration of object-level permissions and capabilities is required to participate in the approval workflow.
Fudo Officer¶
To pair or unpair the Fudo Officer mobile app with an account, the user needs access to the Admin Panel and the modify capability for their own account.
For the Fudo Officer app to function fully, the following permissions are required for the user:
user-read
server-read
listener-read
safe-read
account-read
access-request-vote
access-request-read
Reports Tab Permissions¶
Note
Only users with the report-read and system-report-read permissions are allowed to access system reports, which are automatically triggered by the system. Such reports contain all data from the system, including all objects.
report-createEnsures that a report will be generated and will appear under Reports → Reports.
Allows generating reports from the Sessions tab.
report-readRequired to view any report.
Users cannot view reports generated by other users.
Allows viewing reports according to existing subscriptions, historical reports, and those generated from the Sessions tab.
report-modifyAllows managing report subscriptions from the Reports → Settings tab.
An admin can add a subscription for any type of report.
Generated data is limited to objects and data to which the user has permissions.
Note
Data in the generated report is limited to objects and other information to which the user has access.
report-deleteUsers can only delete their own reports.
system-report-readGrants access to system-level report content, regardless of assigned capabilities or privileges.
Must be combined with
report-readto make system reports and the Reports tab visible.This permission is intended to be assigned exclusively to users with the
superadminrole.
Related topics: