Roles

With roles, the 'Permissions' of all team members can be individually designed and easily managed. You can either create individual roles or assign system roles.

Assign Role

  1. Go to 'Settings' β†’ 'Team Members'

  2. Click on the desired team member

  3. Assign one or more roles to the user and save the settings.

Individual Roles

Individual roles allow you to assign view, edit and delete rights for each individual function according to the needs of your work organization.

  1. Go to 'Settings' β†’ 'Roles'

  2. Assign a name and a description.

  3. Define under 'Permissions' which rights the respective role should have.

Permissions

All important functions of the Enginsight platform can be assigned customized permissions.

Structure of a Permission

The structure of each permission follows the same principle.

FUNCTION_ and following:

Permission
Meaning

*

All permissions of the corresponding function

VIEW

Permission to view the function and data

EDIT

Permission to make adjustments

CREATE

Permission to add a new entry

REMOVE

Permission to delete an entry

If not all permissions are available for certain functions, this is because the operation is generally not possible. (For example, invoices cannot be deleted).

Existing Permission

Permissions can be set for the following functions.

Cross-module

Permission
Meaning

*

All functions.

PDFREPORTS

PDF-Reports

Dashboard

Permission
Meaning

CONFIGURATIONLISTS

Configurations-Lists

CONFIGURATIONPOLICIES

Configurations-Policies

Issues

Permission
Meaning

ISSUES

Issues

MAINTENANCES

Maintenance periods

Hosts

Permission
Meaning

HOSTS

Hosts

PLUGINS

Plugins

Endpoints

Permission
Meaning

ENDPOINTS

Endpoints

Observations

Permission
Meaning

OBSERVATIONS

Observations

WATCHDOG

Watchdog

Shield

Permission
Meaning

SHIELD

Shield

Penetration Testing

Permission
Meaning

PENTEST

Open Penetration Testing

AUDITS_CREATE

Start pentest

AUDITS_VIEW

See pentest results

AUDITTEMPLATES

Templates

TARGETGROUPS

Target Groups

HACKTORS

Hacktor

Discovery

Permission
Meaning

DISCOVERIES

Asset Discovery

INVENTORY

WATCHDOG

Watchdog

Alerts

Permission
Meaning

ALERTS

Alerts

WEBHOOKS

Webhooks

Settings

Berechtigung
Bedeutung

ACCOUNT

Own Useraccount

ACCESSKEYS

Accesskeys

GROUPS

Groups

INVOICES

Invoices (SaaS)

ORGANISATIONS

Oganizations

PAYMENTMETHODS

Payment methods (SaaS)

ROLES

Roles

SUBSCRIPTIONS

Subscriptions (SaaS)

MEMBERS

Team members

LICENCE

Licenses, Contingent Management (On-Premises)

System Roles

Reasonable authorization-combinations often depend on the individual needs of the respective IT department. We offer system roles for recurring requirements. Here we distinguish between owner, administrator, operator and guest.

Action Rights
Viewing Rights
No Access

🟩

🟨

⬜️

Viewing and action rights

Owner
Administrator
Operator
Guest

Dashboard

🟩

🟩

🟨

🟨

Issues

🟩

🟩

🟩

🟨

Hosts

🟩

🟩

🟨

🟨

Endpoints

🟩

🟩

🟨

🟨

Shield

🟩

🟩

⬜️

⬜️

Penetration Testing

🟩

🟩

⬜️

⬜️

Discoveries

🟩

🟩

⬜️

⬜️

Observations

🟩

🟩

🟨

🟨

Alerts and Issues

🟩

🟩

🟩

🟨

Viewing and action rights: Settings

Owner
Administrator
Operator
Guest

User Account

🟩

🟩

🟩

🟩

Password

🟩

🟩

🟩

🟩

Multi-Factor-Authentication

🟩

🟩

🟩

🟩

Roles

🟩

🟩

⬜️

⬜️

Responsibilities

🟩

🟩

⬜️

⬜️

Access Keys

🟩

🟩

⬜️

⬜️

Groups

🟩

🟩

⬜️

⬜️

Payment Methods (SaaS)

🟩

⬜️

⬜️

⬜️

Plans (SaaS)

🟩

⬜️

⬜️

⬜️

Invoices (SaaS)

🟩

⬜️

⬜️

⬜️

Contingent Management (On-Premises)

🟩

⬜️

⬜️

⬜️

Support

🟩

⬜️

⬜️

⬜️

Last updated

Was this helpful?