Introduction

Effective access control begins with role definition. By assigning roles to users and groups, you can manage permissions consistently across all resources.

The platform allows you to create multiple roles to accommodate various access requirements, with the Administrator role providing the highest level of access and full control over all resources.

  • Roles define the access permissions assigned to users or user groups within your organization.
  • Each role consists of a set of permissions and configurations that control what actions a user can perform and which features they can access on the platform.

You can configure Roles at the Service Provider(SP), Partner, and Client levels respectively.

Prerequisite

  • Permission sets have been created and available.

Permissions

Following are the permissions required to View the Roles List:

Type of userPermissions
SP/MSPUsers_Manage, Roles_View, and Device_View
ClientAdministration, Users_Manage, Roles_View, and Device_View
  • Following are the permissions required to Add the Roles:
Type of userPermissions
SP/MSPUsers_Manage, Roles_Manage, and Device_Manage,
ClientAdministration, Users_Manage, Roles_Manage, and Device_Manage,

Create a Role

Follow these steps to create a role:

  1. Click Setup > Account. The Account Details page is displayed.

  2. Click the Users and Permissions tile on the Account Details page. The Permission Sets page is displayed.

  3. Click the Roles card. The ROLES listing screen is displayed.

    Roles listing screen

  4. Click +ADD. The ROLE DETAILS screen is displayed.

    Add Roles screen

  5. Enter the following information:

    • Role Name: Unique name of the role.
      If you are a partner user, then select the appropriate option from Role for and Access to.
    • Permission Sets: Select the permission set(s) from the list.
      Click Manage all permission sets to create a permission set.
      Note: The Client Administrator, Client Dashboard Share Permission Set, and Client User are the default permission sets.
    • Description: Provide details to describe the role.

  6. From Resources visibility, select one of the following three options to apply visibility of devices to the role you are creating:

    • All: Lets a role have the visibility of all resources in the client.
    • Specified resources: Lets a role have the visibility of only the selected resources in the client.
      • Select resource group(s) from the Resource groups dropdown.
      • Select resource(s) from the Resources dropdown. You can also click Advanced Search to build a query to search for the resources.
    • None: Prevents a role from having the visibility of the client resources.

  7. From Assigned credentials, select one of the following three options to apply visibility of credentials to the role you are creating:

    • All: Lets a role have visibility of all credentials in the client.
    • Specified credentials: Lets a role have visibility of only the selected credentials in the client.
      • Select credential(s) from the list.
    • None: Prevents the role from having visibility of client credentials.

  8. From Authz Tags, select one of the following three options to apply visibility of tags to the role you are creating:

    • All: Lets a role have visibility of all tags in the client.
      There are no restrictions on logs visibility.
    • Specified authz tags: Lets a role have visibility of only the selected tags in the client.
      Only logs that carry the tags, or have no tags at all, are visible to the user with the assigned role.
      • Select authz tag(s) from the list.
    • None: Prevents the role from having visibility of client tags.
      Only logs without any tags are visible to the user.

  9. In the DASHBOARDS section, select one or more dashboards from the Classic Dashboards dropdown.

  10. In the OPTIONS section, select the default landing page from the Home Page dropdown, according to the user’s role.

  11. Click ADD. The role is created and displayed in the ROLES listing screen.

    Add Roles screen



Users can perform the following actions based on the context:

Type of userCurrent contextUser action
Service Provider UserService Provider
  • Manage roles for service provider users.
  • Manage roles for partner users across current Service Provider's partners.
  • Manage roles for client users across all clients across all partners.
Partner UserPartner
  • Manage roles for partner users.
  • Manage roles for client users across current partner’s clients.
Partner UserClientManage roles for the current client.
Client UserClientManage roles for the current client.



Actions on a role

You can perform the following actions after creating a role:

ActionProcedure/Description
SearchTo search for a role:
  • Click the search icon on the Roles listing page and then enter the role name in the search box.
  • The search result is displayed.
You can also search for roles using the dropdown filter available on the right side of the page. By default, all roles are listed.
ViewTo view a role:
  • Search for the role and click the role name to view the role details.
Edit

Note: You cannot edit a default role.
To edit a role:

  1. Search for the role and click the role name.
  2. Make the necessary changes.
    Alternatively, click the action menu (three dots) that appears when you move the mouse pointer anywhere in the row, and click View. Make the necessary changes.
  3. Click SAVE. The role is saved.
Remove

Note: You cannot remove a default role.
To remove a role:

  1. Search for the role.
  2. Click the action menu (three dots) that appears when you hover over the row
  3. Click Remove.
  4. From the confirmation dialog box, click REMOVE to delete the role.

Use Case

Let is suppose there are a total of five clients under a Partner.

  • Role 1 is created at the Partner level (with Partner as Tenant Scope) with two clients are selected and the Permission Set as a Partner Administrator.

  • Role 2 is created at the Partner level with All Clients selected, and Permission Set as Partner View Only.

These two roles are assigned to a user.

Result: The permission sets may not work as expected, and overlapping roles introduce ambiguity. This is because OpsRamp evaluates permissions cumulatively, and where multiple roles apply, the most permissive access takes precedence.

Recommendation: Create Role 2 at the Partner level and remaining three clients are selected, with Permission Set as Partner View Only.

This ensures that:

  • As a Partner Administrator (via Role 1), the user has full access to resources and configurations for the two selected clients.
  • With the Partner View Only permission set (via Role 2), the user has read-only access to the other three clients.