NAICE supports a role-based access control model (RBAC) that provides flexible and secure management of administrator permissions.
Privileges support five access levels:
Each access level includes all permissions of the previous one.
Some privileges, such as those related to monitoring, have a maximum access level of 1.
When upgrading from version 0.9, all existing administrative accounts receive the Super Admin role, which grants full access to all system capabilities. |
Adding new roles and assigning roles to administrators is described in the built-in documentation (Administration → System users).
Account settings.
Documentation.
Dashboard — widget availability depends on the assigned privileges.
System events — availability of event groups depends on the assigned privileges.
| Privilege | Section | Access restrictions | License level |
|---|---|---|---|
| RADIUS policy | Policies → Elements: | BASIC | |
Policies: |
| ||
Administration → Identity management: | |||
| RADIUSmonitoring | Monitoring → RADIUS: | BASIC | |
| Endpoints | Administration → Identity management: |
| BASIC |
Network resources | Administration → Network resources: | BASIC | |
| TACACS+policy | Network device control → Policy elements: | TACACS+ module | |
Network device control: |
| ||
Administration → Identity management: | |||
| TACACS+monitoring | Monitoring → TACACS+: | TACACS+ module | |
| Profiling | Policies → Profiling: |
| BASIC |
Policies → Elements: | |||
| Roles andaccounts | Administration → System users: | BASIC | |
| Guest access | Guest portals → Portal management: | ADVANCED | |
Administration → Identity management: | |||
Guest users | Guest portals → Portal management: | ADVANCED | |
Enterprise users | Administration → Identity management: |
| BASIC |
System settings | System: | “Send test event” becomes available at level 2 | BASIC |
Licensing |
| ||
External sources | Administration → Identity management: |
| BASIC |
| Notification services | Notification gateways: | “Send test SMS” becomes available at level 2 | ADVANCED |
For the system to operate correctly, some privileges require the presence of other privileges:
The system includes the following predefined roles for common usage scenarios:
| Privilege | Super Admin | Network Admin | Hardware Admin | System Admin | Guest Admin | Guest Operator | Monitor |
|---|---|---|---|---|---|---|---|
| RADIUS policy | 4 | 4 | 0 | 4 | 1 | 0 | 1 |
| RADIUS monitoring | 1 | 1 | 0 | 1 | 1 | 1 | 1 |
| Endpoints | 4 | 4 | 0 | 4 | 0 | 0 | 1 |
| Network resources | 4 | 4 | 4 | 4 | 1 | 0 | 1 |
| TACACS+ policy | 4 | 0 | 4 | 4 | 0 | 0 | 1 |
| TACACS+ monitoring | 1 | 0 | 1 | 1 | 0 | 0 | 1 |
| Profiling | 4 | 4 | 0 | 4 | 1 | 0 | 1 |
| Roles and accounts | 4 | 0 | 0 | 1 | 0 | 0 | 0 |
| Guest access | 4 | 1 | 0 | 4 | 4 | 1 | 1 |
| Guest users | 4 | 4 | 0 | 4 | 4 | 4 | 0 |
| Enterprise users | 4 | 4 | 4 | 4 | 0 | 0 | 0 |
| System settings | 4 | 0 | 0 | 4 | 0 | 0 | 0 |
| External sources | 4 | 1 | 1 | 4 | 0 | 0 | 1 |
| Notification services | 4 | 1 | 0 | 4 | 1 | 1 | 1 |