
Use this procedure to create a new role with customized privileges.
Configure Overlapping Privilege Policy for Access Control Groups. This setting is used if users are assigned to multiple access control groups with conflicting permissions. You can assign your users to the existing default access control groups.Ĭreate custom roles if the default roles don't have the access permissions you need.Ĭreate custom access control groups if the default groups don't have the role assignments you need.Īdd or delete users from a standard or custom access control group.Ĭonfigure Overlapping Privilege Policy for Access Control Groups Before you beginIf you want to use default roles and access control groups then you can skip tasks for creating customized roles and accessĬontrol groups. For details, see Standard Roles and Access Control Groups.Ĭomplete the following tasks to configure user access. Whether an existing access control group has the roles and access permissions that you need. That have the access privileges your users require, but which do not provide access to systems that they should not be ableīefore you create new roles and acess control groups, review the list of standard roles and access control groups to verify Make sure to review your user needs so that you know what level of access your users require. Standard Roles and Access Control Groups User Access Prerequisites For a list of standard access control groups, and their associated roles, see Standard Roles and Access Control Groups.Ĭustom Access Control Groups-Create your own access control groups when none of the standard groups contain the role permissions However, you can add and delete users, in addition to editing the User Rank requirement. You cannot edit the role assignments in a standard group. Standard Access Control Groups-These are predefined default groups with role assignments that meet common deployment needs. There are two types of access control groups: The roles and permissions that they need. You can manage system access by assigning users with similar access needs to an access control group with only User, or administrator user to an access control group, the user gains the access permissions of the roles that are associated You cannotĬustom roles-Create custom roles when no standard roles have the privileges you need.Īn access control group is a list of users and the roles that are assigned to those users. Standard roles-These are preinstalled default roles that are designed to meet the needs of common deployments. There are two main types of roles in Cisco Unified Communications Manager:
When provisioning users, you must decide what roles you want to apply and then assign users to an access control group thatĬontains the role.
#DO COPY SYSTEMS AND ADMINISTRATORS PERMISSION ON EMCOPY UPDATE#
No Access-If a user has neither Read or Update access, the user has no access to view or edit settings for a given resource.
Update-Allows a user to edit settings for a resource. Read-Allows a user to view settings for a resource. That you can assign to a resource or application: For an application such as Cisco Unified CM Administration, the role mayĬontain permissions that let you view or edit specific GUI pages in the application. Each role contains a set of permissions that is attached to a specific resource or application, such as Cisco UnifiedĬM Administration or CDR Analysis and Reporting. Users obtain system access privileges via the roles that are associated to the access control group of which the user is a Settings by setting up new access control groups and roles. You can assign your end users to the default access control groups, or you can customize access Upon installation Cisco Unified Communications Manager comes with predefined default roles that are assigned to predefinedĭefault access control groups. When you assign a role to an accessĬontrol group and then assign end users to that access control group, you grant those end users all the access permissions Each role definesĪ set of permissions for a specific resource within Cisco Unified Communications Manager. Roles and access control groups provide multiple levels of security to Cisco Unified Communications Manager. You can manage user access to Cisco Unified Communications Manager by assigning your end users to access control groups that Standard Roles and Access Control Groups.