Access control lists (ACLs) and ACL Profiles

An access control list (ACL) is a table of access levels for all resource types per organizational unit (OU). An ACL profile is a collection of ACLs that you assign to administrators to define their level of access to resources.

Access control list (ACL) levels of access range from the lowest level of None through Read-only, Modify, Create, and up to the highest level All. You can create as many ACL profiles as you want and you can assign one profile to as many administrator IDs as you want.

When an administrator logs in to the SafeLinx Administrator, resources the administrator can access are displayed in the Resources tab. Tasks appropriate to the administrator are available in the Tasks tab and in resource task options.

Note: When you create an administrator, you assign the administrator to a primary organizational unit. As with any other resource, this primary OU is the unique key for locating an administrator's definition. Admins do not have access automatically to resources within their primary OU unless access is given to them as part of their ACL profile.

For example, as the super user administrator for the company BigNet, you administer a SafeLinx Server, which services the subsidiaries CoA, CoB, and CoC. In the organizational structure of the company, these three subsidiaries are considered part of the North region. SafeLinx Administrator represents the organizational relationship for the North region as a folder tree in which the parent folder, labeled North, opens to display child folders labeled, CoA, CoB, and CoC, as shown in the following diagram:


This diagram shows how SafeLinx Administrator uses a folder hierarchy to illustrate that the OU North contains three child OUs, CoA, CoB, and CoC. In the first column, an open folder icon, labeled North, represents the parent OU. In the next column, subordinate to the North folder, three closed folder icons, labeled CoA, CoB, and CoC, represent the child OUs that belong to the parent North OU.

You need three BigNet administrators, one for each of the three companies. You create three administrator resources under an Admin primary OU for o=BigNet,c=US. The three administrators are represented by a single Administrator icon.


This diagram shows how SafeLinx Administrator uses a folder hierarchy to show that administrator users are added to a parent Admin OU. In the first column, an open folder icon, labeled Admin, represents the parent OU. In the next column, subordinate to the Admin folder, a person icon, labeled Administrator, represents the three administrator users that you added to the Admin OU. In the next row, the diagram also depicts the folder tree that represents the North OU. In the first column, it shows the open North folder, and in the next column, three child folders, labeled CoA, CoB, and CoC.
You want the three administrators to be aware of the BigNet configuration without making them active participants. At the same time, you want to give each administrator management control over mobile devices and users within their company. To do this task, you create an ACL profile similar to this abbreviated one:
Resource Type Access Level Other
SafeLinx Server Read start=0, reset=0
Mobile Device Dial Add
Modem Profile Read
Password Policy Add
User All cbpwd=1, resetfl=1, lock=1

Then, you apply the ACL profile to the three administrators.

The following diagram show how SafeLinx Administrator represents the CoA organizational unit and its resources to the administrator of the CoA OU:


This diagram shows how SafeLinx Administrator represents the hierarchical relationship between the CoA OU and the resources that belong to it. In the first column, an open folder icon, labeled CoA. represents the parent OU. In next column, subordinate to the CoA folder, six icons that represent different types of resources are listed. The icons, are labeled SafeLinx Server, Group, Mobile device, Modern profile, Password policy, and User.
Note: Admin can right-click a resource to see what tasks are available to them. The access controls that are assigned to the resource determine which tasks are available.
In a different example, still looking at BigNet and its three companies, as super user admin, you want to define an admin with specific responsibilities: a password admin who has read-only access to all users, but who is still able to change user passwords. Here is the abbreviated ACL profile for each OU the password admin can access:
Resource Type Access Level Other
User Read chpwd=1, resetfl=0, lock=0
SafeLinx Server None start=0, reset=0
Mobile Device None
Modem profile None
Password profile None

The following diagram shows the organizational units and resources that SafeLinx Administrator displays to the password administrator:

This diagram shows how SafeLinx Administrator represents the hierarchical relationship between three OUs, CoA, CoB, and CoC, and their users. Open folders in the first column are labeled CoA, CoB, and CoC. In the next column, subordinate to each OU folder, threee icons that are labeled User represent the users that belong to each OU.

To assign access levels to an admin ID for resources within an OU, first create an ACL profile, add ACLs to it, then assign it to the admin ID.

To add an ACL profile, from the Tasks pane or the Resources pane, right-click the OU in which you want to add the profile, then click Add Resource > ACL Profile. Follow the wizard instructions to name and describe the profile and select the organizational unit to which it belongs. After the ACL profile wizard is complete, you are prompted to add ACLs to the profile. Follow the wizard instructions to add the ACLs to the profile and define the access you want the admin to have.

Next, assign the ACL profile to the admin ID. Select the admin ID and click Properties. Click the Access type tab, then click Access control list. Select the ACL profile from the list, then click OK or Apply.

Note:
  1. For admins that are assigned an ACL profile, when you want them to manage a resource, give them access to that resource and grant separate access to all the resources needed to support that resource. For example, if they are managing users, give at least read-only access to resources like password policies so that they can assign a policy to the users.
  2. A transport profile is the only resource for which you cannot set an ACL. Instead, the transport profile inherits its ACL from the ACL setting for connection profile resources under that OU.