![Red Hat NETWORK 3.6 - Reference Manual Download Page 123](http://html1.mh-extra.com/html/red-hat/network-3-6/network-3-6_reference-manual_1427569123.webp)
Chapter 6. Red Hat Network Website
111
6.8.1. User Roles
To delegate responsibilities within your organization, Red Hat Network provides several roles with
varying degrees of responsibility and access. This list describes the permissions of each and the dif-
ferences between them:
•
User
— Also known as a
System Group User
, this is the standard role associated with any newly
created user. This person may be granted access to manage system groups and software channels but
is otherwise limited to managing the systems he or she registers. Remember, however, all globally
subscribable channels may be used by anyone.
•
Activation Key Administrator
— This role is designed to manage your organization’s collection
of activation keys. This person can create, modify, and delete any key within your overarching
account.
•
Software Channel Administrator
— This role has complete access to the software channels and
related associations within your organization. This person may change the base channels of systems,
make channels globally subscribable, and create entirely new channels, if your organization has
custom channel management privileges.
•
Configuration Administrator
— This role enables the user to manage the configuration of systems
in the organization using either the RHN website or the
RHNCM;
.
•
Monitoring Administrator
— This role allows for the scheduling of probes and oversight of other
Monitoring infrastructure.
•
Organization Administrator
— This role can perform any function available within Red Hat
Network. As the master account for your organization, the person holding this role can alter the
privileges of all other accounts, as well as conduct any of the tasks available to the other roles. Like
the other roles, multiple Organization Administrators may exist.
•
System Group Administrator
— This role is one step below Organization Administrator in that
it has complete authority over the systems and system groups to which its granted access. This
person can create new system groups, delete any assigned systems groups, add systems to groups,
and manage user access to groups.
6.8.2. User List —
As shown in Figure 6-8, each row in the
User List
represents a user within your organization. There
are three columns of information for each user:
•
Username
— The login name of the user. If you click on a username, the
User Details
page for the
user is displayed. Refer to Section 6.8.2.2
User Details —
for more information.
•
Real Name
— The full name of the user (last name first).
•
Roles
— List of the user’s privileges, such as Organization Administrator, Channel Administrator
and normal user. Users can have multiple roles.
•
Last Sign In
— Shows when the user last logged into RHN.
Summary of Contents for NETWORK 3.6 -
Page 1: ...Red Hat Network 3 6 Reference Guide ...
Page 8: ......
Page 54: ...42 Chapter 4 Red Hat Network Alert Notification Tool ...
Page 68: ...56 Chapter 5 Red Hat Network Registration Client ...
Page 130: ...118 Chapter 6 Red Hat Network Website ...
Page 138: ...126 Appendix A Command Line Config Management Tools ...
Page 142: ...130 Appendix B RHN API Access ...
Page 186: ...174 Appendix C Probes ...
Page 192: ...180 Glossary ...