Chapter 9.  Implementing Security Roles

In this chapter, we will cover the following topics:

  • Viewing basic settings for Security roles
  • Adding users to the End Users role
  • Creating and managing Service Request roles
  • Creating and managing Incident Management roles
  • Creating and managing Problem Management roles
  • Creating and managing Change and Release Management roles
  • Creating hybrid roles
  • Configuring the Self-Service Catalog security role
  • Listing SCSM security role details with PowerShell
  • Getting SCSM security roles of a specific user with PowerShell

Introduction

This chapter discusses the security model used in System Center 2016 Service Manager (SCSM) and provides the configuration steps required to personalize the security model to your needs.

Security is applied across all objects you can manage in SCSM. The security model in use is commonly known as Role Based Administration (RBA). The RBA model provides a consistent method of delegating security control over what a user can interact with and what actions they can perform. System Center 2016 Service Manager has 13 default security roles.

The 13 default roles are as follows:

  • Activity Implementers
  • Administrators
  • Advanced Operators
  • Authors
  • Change Initiators
  • Change Managers
  • End Users
  • Incident Resolvers
  • Problem Analysts
  • Read-Only Operators
  • Release Managers
  • Service Request Analysts
  • Workflows

The default security roles cannot be removed and have only one editable option; you can assign users or groups to a default role. The actions and implied actions of SCSM security roles can be found in the official product administrative guide and online at https://technet.microsoft.com/en-us/system-center-docs/sm/manage/admin-managing-user-roles-in-system-center-2016-service-manager.

The security settings you apply to your SCSM environment require you to plan and test your scenarios. The recipes in this chapter will provide us with the technical steps required to implement your personal security model.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.40.53