5 0 0:SEP sesam User Types

From SEPsesam
Other languages:
Copyright © SEP AG 1999-2022. All rights reserved.

Any form of reproduction of the contents or parts of this manual is allowed only with the express written permission from SEP AG. When compiling and designing user documentation SEP AG uses great diligence and attempts to deliver accurate and correct information. However, SEP AG cannot issue a guarantee for the contents of this manual.

Docs latest icon.png Welcome to the latest SEP sesam documentation version 5.0.0 Jaglion. For previous documentation version(s), check Documentation archive.


Overview

Users can connect to SEP sesam Server only if they are granted appropriate permissions. Their user rights and also displayed GUI components depend on the user type. The user type can be specified when configuring authentication. For details, see About Authentication and Authorization.

User types

As of. SEP sesam version 5.0.0 Jaglion, the authentication and authorization is enhanced with two new user types – superuser, which replaces the previous Admin role, and backup user. (In previous SEP sesam versions the available user types were admin, operator and restore.)

SEP sesam currently provides 5 user types. The following list shows the available user types and their corresponding rights.

  • Superuser (≥ Jaglion): The only user type with full control over the SEP sesam environment (previously Admin). This user type with superuser rights is automatically assigned exclusively to the Administrator user when database-based authentication is activated. If policy-based authentication is enabled, this user type with superuser rights is assigned to the Administrator, root and sesam users.
  • Administrator: Administrators can administer the SEP sesam system and access the GUI objects (except permission management) if not restricted by ACLs.
  • Operator: Operators can monitor the whole environment.
  • Backup (≥ Jaglion): Backup users can access the GUI objects granted by ACLs. They are also allowed to start backups and restores.
  • Restore: Restore users can access the GUI objects granted by ACLs. They are only allowed to start standard restores.

See also

About Authentication and AuthorizationConfiguring Database-Based AuthenticationConfiguring Policy-Based Authentication