Configuring Role Templates
- Former user (Deleted)
- Shilpa K (Deactivated)
- Saranya S (Unlicensed)
Each Role Template is associated with a set of modules and a set of Tenants with View or Edit access. Each Role Template should be mapped to a domain, and the corresponding users who need access to that Role Template should also be mapped to the same domain from the USER LIST page. The Users can then access the Modules and Tenants as per the defined configuration settings within that Role Template. If a user is mapped to a single domain, then the domain is selected by default.
To configure Role Templates:
- Select Admin> Basic > Users > Role Template. The ROLE TEMPLATE page is displayed.
- On the ACTIONS panel, click Filters and select the Domain from the drop-down list.
- A list of configured Role Templates for the selected Domain are displayed.
Figure: ROLE TEMPLATE page
- To view the list of inactive Role Templates, select the Include Inactive check box.
- Click a Template Name. The ROLE TEMPLATE - MENU CONFIGURATION page is displayed. You can view or modify the menu configuration. For more information about fields on the ROLE TEMPLATE - MENU CONFIGURATION page, see Role Template Menu Configuration.
- Click the OTHER CONFIGURATION icon on the ACTIONS panel to view or modify the Other Configuration details for the selected Role Template. For more information about fields on the ROLE TEMPLATE - OTHER CONFIGURATION page, see Role Template Other Configuration.
- You can add Role Templates and configure menus and other configuration using the icons on the ACTIONS panel.
ACTIONS
This section explains all the icons displayed on the ACTIONS panel of the ROLE TEMPLATES page.
ADD MENU CONFIGURATION
Click ADD MENU CONFIGURATION to create a new Role Template and configure menus for the Role Template for specific modules. For more information about configuring menus for a Role Template, see Role Template Menu Configuration.
ADD OTHER CONFIGURATION DETAILS
Click ADD OTHER CONFIGURATION DETAILS to create a new Role Template and configure other configurations for the Role Template. For more information about configuring other details, see Role Template Other Configurations.
Super Admin Role Template
The Super Admin Role Template is an out-of-the-box (OOTB) system defined Role Template provided by default. To enable the first user to login to Symphony SummitAI Application and define other Role Templates for an Admin, Analyst, or End User, the Super Admin Role Template is used. The Super Admin Role Template has complete access to all the UI pages, by default with Edit and View access privileges.
Login to the App with Super Admin Role template privileges using the username mentioned during installation, you must login to the App with Super Admin Role template. Post logging-in define other role templates and then assign it to the user(s) such as Administrator, End User and Analyst.
Note:
You cannot modify the Super Admin Role Template as it is a system defined Role Template.
The following screen depicts the Super Admin Role Template, once the first-time user logs-in to the App.
Figure: Super Admin Role Template
The following infographic depicts the high-level functionality of Super Admin Role Template.
Getting started as a First Time User
During installation process, you need to provide the username who will login to the App and configure other Role Templates. The first time user will have access to Super Admin Role Template, by default. Specify the Name and E-mail ID of the user on Customer Details screen of Symphony SummitAI Configuration Tool page.
As shown in the below screenshot, Fredrick Norton with e-mail ID Fredrick.norton@zacme.com will be the first time user of the Symphony SummitAI application having access to Super Admin Role Template.
Figure: Symphony SummitAI Configuration Tool - Customer Details
Click Update and the Application Configuration screen appears with password.
Figure: Symphony SummitAI Configuration Tool - Application Configuration
Using ROLE TEMPLATE MAPPING icon under ACTIONS on ROLE Template – Menu Configuration page, you can create new Role Templates and assign UI page access privileges to the Role Template and map the users to the Role Template. Based on your requirement, you can give any name to the Role Template. It will simplify the process for the first-time user to further create a set of pages for various modules.
The following screenshot is an example of a Role Template (ADMIN ROLE) for Incident module created with the respective UI page access provided, after logging in with a Super Admin Role Template.
Figure: ADMIN ROLE Template
Super Admin Role Template Vs General Admin
Parameter | Super Admin Role Template | Admin |
Role template | Super Admin has a non-editable Role Templates. Navigate to Admin > User > Role Template > Select the required Tenant and Module. As shown in the below screenshot, for Super Admin Role Template, SUBMIT button is not present to save the modified changes. Screenshot - Super Admin Role Template | General Admin or any other Admin Templates can be edited. Navigate to Admin > User > Role Template > Select the required Tenant and Module. As shown in the below screenshot, for Admin Role Template, SUBMIT button is present to save the modified changes. Screenshot - Admin Role Template |
Manual Creation or Default | The Super Admin Role Templates are Default Templates available in the system and these persists throughout the build. | The General Admin or any other Admin Templates are created manually. |
Access Control | The Super Admin Templates have default access to all the pages in SUMMITAI UI. | An Admin can provide necessary access to the required pages based on requirement. |
References
- For adding Role Template - Menu Configuration, see Role Template Menu Configuration.
- For adding Role Template - Other Configuration, see Role Template Other Configurations.
- For adding Users, see Adding Users.
- For configuring Analysts, see Configuring Analysts.
Confluence Cloud Migration Alert: Please refer to known issues you may encounter in Confluence Cloud: https://eitdocs.atlassian.net/wiki/x/wDGwAQ