Create a user to log in to ThirdEye. By assigning permissions to users, you can limit the operations that users can perform. In ThirdEye, you can specify in detail by combining multiple permissions. Users and permissions can be set from [Settings] in the global menu.



ADD PERMISSIONS


“Administrator” who has all execution rights is registered. This authority cannot be deleted.

 

  1. Click [Roles].

2. Enter the authority name in the [Add Authority] field and click [    (Add)].



3. The authority name is added to the list and changes to the selected state. Check the required items from the authority items at the bottom right of the screen.




No.

Description

1

Permission to create/update/delete monitors.

2

Permission to administer incidents.

3

Permission to view maps.

4

Permission to create/update/delete maps.

(* No.3: Authority attached to “Permit map viewing”)

5

Permission to administer SNMP MIBs.

6

Permission to administer credential and protocols.

7

Permission to create/update/delete device information in the inventory.

8

Permission to assign names to custom fields.

9

Permission to tag/untag devices in the inventory.

10

Permission to administer scheduler filters.

11

Permission to run a device discovery job.

12

Permission to create/update/delete a device discovery job.

(* No. 11: Authority attached to “Permit discovery execution”)

13

Permission to run a maintenance window job.

14

Permission to create/update/delete a maintenance window job.

(* No.13: Authority attached to “Permit execution of unmonitored jobs”)

15

Permission to run a report.

16

Permission to create/update/delete a report job.

(* No.15: Authority attached to “Permit report execution”)

17

Permission to create/update/delete URL launchers.

18

Permission to create/update/delete memos.

19

Permission to create/update/delete managed networks.

20

Permission to security settings.

21

Permission to create/update/delete inventory tags.

22

Permission to login using the terminal server proxy.

23

Permission to view other users’ terminal proxy logs.


4. click on [OK].



ADDING USERS


  1. Click [   (Add)].


2. The Add User screen is displayed. Enter the items and click [OK].



Category

Item

Explanation

Required

General

Username

Enter your username.

P

Full name

Enter the user's full name.

O

Email Address

Enter the user's email address.

O

Role

Select user permissions. The authority set in "7.3.1 Adding authority" can be selected from the pull-down menu.

P

Password

Set the user's password.

P

Custom Fields

Custom 15

Select custom device fields that users can view.

* The displayed item name changes based on the setting in “7.7 Change column name of custom device field”.

O