Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Excerpt
hiddentrue

test

Review permissions for popular AMP screens

Review the following tables to understand the permissions needed to interact with popular screens in AMP. 

Note

To view every permission available in AMP, see Review all permissions.

Note

In the Roles and Permissions screen in AMP, you may see permissions that only apply to Armor Anywhere users. Your roles will not malfunction if you happen to add an Armor Anywhere permission to your role.



Permissions for virtual machines and workloads

Screen / FeatureActionsPermissionsAdditional information
Virtual Machines and Workloads
  • Create a virtual machine 
  • Reboot, reset, or turn off a virtual machine
  • Delete a virtual machine
  • Resize a virtual machine
  • Upgrade a virtual machine
  • Downgrade a virtual machine
  • Add disk space to an existing virtual machine
  • Export virtual machine data
  • View a workload
  • Create a workload

  • Read Workload(s)
  • Write Workload
  • Read Virtual Machine Stats
  • Read Virtual Machine(s)
  • Write Virtual Machine
  • Scale Virtual Machine
  • Read Location(s)
  • Read Virtual Data Centers
  • Read Tasks
  • Write Tasks
  • Read Storage
  • Read Network L2L
  • Write Network L2L
  • Read SSL VPN Devices and Users
  • Write SSL VPN Devices and User
Note

If you ordered the Continuous Server Replication (Data Recovery) add-on product, then you must also have the following permissions:

  • Read Server Replication
  • Write Server Replication
Note

To learn more about the Virtual Machines screen, see Virtual Machines.



Permissions for IP addresses

Screen / FeatureActionsPermissionsAdditional information
IP Addresses
  • Assign a new public IP address to virtual machine
  • Assign an existing public IP address to a virtual machine
  • Remove an existing public IP address from a virtual machine
  • Delete an unassigned public IP address
  • Delete an assigned public IP address
  • Assign an available private IP address to a virtual machine
  • Unassign a secondary private IP address from a virtual machine
  • Read Network IP
  • Write Network IP
  • Read Network NAT
  • Write Network NAT
  • Read Location(s)
  • Read Virtual Data Centers
Note

To learn more about the IP Addresses screen, see IP Address.



Permissions for firewall rules

Screen / FeatureActionsPermissionsAdditional information
Firewall
  • Create a firewall rule with a new IP address group
  • Create a firewall rule with an existing IP address group
  • Edit a firewall rule
  • Edit name
  • Edit source
  • Edit destination
  • Edit action
  • Edit services
  • Enable or disable a firewall rule
  • Delete a firewall rule
  • Export firewall data
  • Create an IP group
  • Create a service group
  • Write Network IP Addresses 
  • Read Firewall 
  • Write Firewall 
  • Read Location(s)
  • Read Virtual Data Centers
Note

To learn more about the Firewall screen, see Firewall Rules.






Permissions for L2L VPN tunnels

Screen / FeatureActionsPermissionsAdditional information
L2L VPN
  • Create an L2L VPN tunnel with a new workload
  • Edit an L2L VPN tunnel
  • Enable, disable, or delete an L2L VPN tunnel

  • Read Network L2L
  • Write Network L2L
  • Read Location(s)
  • Read Virtual Data Centers

Note

To learn more about the L2L VPN screen, see L2L VPN Tunnel.



Permissions for SSL/VPN 

Screen / FeatureActionsPermissionsAdditional information
SSL/VPN
  • Enable and install your SSL/VPN access
  • Enable SSL/VPN access for your user
  • Disable SSL/VPN for your user
  • Read Network L2L
  • Write Network L2L
  • Read Location(s)
  • Read Virtual Data Centers

Note

To access a virtual machine, you must download and install the SSL/VPN client. An account administrator must first enable their users the ability to download the client. As a result, an account administrator must have the following permissions enabled in their account: 

  • Read SSL VPN Devices and Users
  • Write SSL VPN Devices and Users
  • Read Location(s)
  • Read Virtual Data Centers
Note

To learn more about the SSL/VPN screen, see SSL VPN.



Permissions for support tickets

Screen / FeatureActionsPermissionsAdditional information
Tickets
  • Create a support ticket
  • View a support ticket
  • View an archived ticket
  • Add a recipient to an existing support ticket
  • Chat with Armor
  • Read Ticket(s)
  • Read Ticket Group(s)
  • Write Ticket Group(s)
Note

In addition to these permissions, in order to view a ticket, you must be listed as a recipient. For example, if a user in your account sends a support ticket, and you are not listed as a recipient, then you will not be able to see this ticket.

Note

To learn more about the Tickets screen, see Support Tickets.



Excerpt
hiddentrue

Permissions for Advanced Backup 

Screen / FeatureActionsPermissionsAdditional information
Advanced Backup
  • Create a snapshot policy
  • Assign a policy to a virtual machine
  • Restore a virtual machine from a backup 
  • Read Avanced Backup Plans
  • Commit Advanced Backup Restore
  • Create Advanced Backup Policy
  • Read Advanced Backup
  • Read Advanced Backup Policy
  • Read Advanced Backup Snapshots
  • Read Advanced Backup Vms
  • Refresh Advanced Backup Snapshots
  • Remote Advanced Backup
  • Request Advanced Backup Restore
  • Update Advanced Backup Policy
  • Write Advanced Backup 
Note

Additionally, you must have all the permissions for the Virtual Machines screen.

Note

To learn more about the Advanced Backup screen, see Advanced Backup.



Permissions for Continuous Server Replication (Disaster Recovery)

Screen / FeatureActionsPermissionsAdditional information
Continuous Server Replication (Disaster Recovery)
  • Order Continuous Server Replication (Disaster Recovery) 
  • Request a test failover
  • Request a live failover
  • Read Server Replication
  • Write Server Replication 
Note

Additionally, you must have all the permissions for the Virtual Machines screen.

Note

To learn more about Continuous Server Replication (Disaster Recovery):



Permissions for Log & Data Management

Screen / FeatureActionsPermissionsAdditional information
Log & Data Management
  • View collected logs in the Search section
  • View the status of the logging subagent in the Sources section
  • Write LogManagement
  • Read LogManagement 
Note

To learn more about Log Management, seeNOT PUBLISHED: Log Management (Armor Complete).



 


Permissions for Armor Marketplace

Screen / FeatureActionsPermissionsAdditional information
Armor Marketplace
  • View available add-on products
  • View subscription-based add-on products
  • Add and cancel products
  • Read Product Catalog
  • View Subscriptions
  • Write Subscriptions
Note

To learn more about the Armor Marketplace screen, see Armor Marketplace.



Permissions for the Health Dashboards

Screen / FeatureActionsPermissionsAdditional information
  • Health Overview (landing screen)
    • Protection
    • Detection
    • Response
    • Security Incidents
  • View the data that populates the security dashboards
  • Read Dashboard Statistics
Note

To learn more about the dashboards, see Health Overview Dashboard (Armor Complete).



Permissions for Security screens

Screen / FeatureActionsPermissionsAdditional information
  • Security screens
    • Malware Protection
    • File Integrity Monitoring (FIM)
    • Patching
  • View the data that populates the security-focused screens
  • Read AVAM
  • Read FIM
  • Read OS Packages




...