Skip to content

Commit

Permalink
Merge branch 'DOCS-3280-update-role-names' into publish-11-20-2023
Browse files Browse the repository at this point in the history
  • Loading branch information
sarette committed Nov 17, 2023
2 parents 2adf16e + 8478cd2 commit 32359fd
Showing 1 changed file with 12 additions and 3 deletions.
15 changes: 12 additions & 3 deletions products/sase/docs/all-roles.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -14,17 +14,26 @@ The following are all the roles currently supported by SASE:

| Role | UI Label | Description |
| ------------------- | --------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| adem_tier_1_support | ADEM Tier 1 Support | This role provides access to specific incident remediation workflows for Prisma Access ADEM. |
| auditor | Auditor | This role provides read-only access to functions related to all configuration, including subscriptions and licenses. Assign this role to users or service accounts that need to examine the system for accuracy. |
| browser | Browser | This role provides access to only the essential features required by Palo Alto Networks UI Applications. |
| business_admin | Business Administrator | This role provides access to all subscription and license management. This role also provides read-only access to other functions, including but not limited to: access policies, service accounts, and tenant service group operations. |
| data_security_admin | Data Security Administrator | This role provides access to all data security functions. In addition, it provides read-only access to logs. This role contains a very small subset of privileges compared to the Security Admin role. |
| deployment_admin | Deployment Administrator | This role provides access to functions related to deployments. In addition, this role provides read-only access to other functions. |
| dlp_incident_admin | DLP Incident Administrator | This role provides access to functions related to dlp incident and report. This role also provides read-only access to other functions, including but not limited to: data profile, data filtering profile, data pattern, EDM and OCR settings. |
| dlp_policy_admin | DLP Policy Administrator | This role provides access to functions related to dlp policy including but not limited to: data profile, data filtering profile, data pattern, EDM and OCR settings. |
| iam_admin | IAM Administrator | This role provides access to identity and authentication functions. In addition, it provides read-only access to logs. Assign this role to users or service accounts that need to manage users or service accounts. |
| msp_iam_admin | MSP IAM Administrator | This role provides access to identity and authentication functions for all tenants in a multitenant hierarchy. In addition, it provides read-only access to logs. |
| msp_superuser | MSP Superuser | This role provides full read and write access to all functions for all tenants in a multitenant hierarchy. Assign this role only to users or service accounts that need unrestricted access to the MSP portal. |
| msp_iam_admin | Multitenant IAM Administrator | This role provides access to identity and authentication functions for all tenants in a multitenant hierarchy. In addition, it provides read-only access to logs. |
| msp_superuser | Multitenant Superuser | This role provides full read and write access to all functions for all tenants in a multitenant hierarchy. Assign this role only to users or service accounts that need unrestricted access to the MSP portal. |
| mt_manage_user | Multitenant Manage User | This role provides access to functions related to multitenant management and other common resources. |
| mt_monitor_user | Multitenant Monitor User | This role provides access to functions related to multitenant monitoring and other common resources. |
| network_admin | Network Administrator | This role provides access to functions related to network configuration. This role also provides read-only access to other functions, including but not limited to: alerts, license quotas, devices, and tenant service group operations. |
| security_admin | Security Administrator | This role provides access to functions related to security policy configuration. This role also provides read-only access to other functions, including but not limited to: alerts, license quotas, devices, and tenant service group operations. |
| soc_admin | SOC Administrator | This role allows the administrator to assess incidents and remediate risks in SaaS Security. This administrator cannot access SaaS Security API settings or modify policy rules. |
| soc_analyst | SOC Analyst | This role provides read-only access to functions related to logs, reports, events, alerts, and all configuration. Assign this role to users or service accounts that need to view and investigate threats and trends. |
| sspm_appowner_superuser | Posture Security Administrator | This role provides full SSPM functionality but only for the SaaS application(s) that the administrator onboards themselves. It is intended to give IT/SaaS administrators full SSPM read and write access to the SaaS apps they are responsible for. |
| superuser | Superuser | This role provides full read and write access to all the available system-wide functions. It includes all the permissions of all the other roles, including MSP Superuser. Assign this role only to users or service accounts that need unrestricted access. |
| tier_1_support | Tier 1 Support | This role provides access to specific incident remediation workflows that update network, security, SD-WAN, GlobalProtect, and device configuration. This role also provides read-only access to other functions. |
| tier_2_support | Tier 2 Support | This role provides access to specific incident remediation workflows that update network, security, SD-WAN, GlobalProtect, and device configuration. This role also provides read-only access to other functions. |
| view_only_admin | View Only Administrator | Read only access to all functions. |
| view_only_admin | View Only Administrator | Read only access to all functions. |
| web_security_admin | Web Security Admin | This role provides access to functions related to web security for Prisma Access. |

0 comments on commit 32359fd

Please sign in to comment.