Table of Contents

Search

  1. Preface
  2. Introduction to MDM Hub Security
  3. Resources
  4. Roles
  5. Users and User Groups
  6. Security Providers
  7. Application Level Security
  8. Certificate-Based Authentication
  9. Password Hashing
  10. Appendix A: Glossary

Role Configuration

Role Configuration

You can create, edit, and delete roles in the
MDM Hub
.
If you use a comprehensive centralized security deployment, in which users are authorized externally, you do not need to configure roles.
Resource privileges vary based on the scope of access required for users to do their jobs. The best practice for administrators is to follow the principle of least privilege. Assign to users the lowest level of privilege needed to do their work.

0 COMMENTS

We’d like to hear from you!