Space Roles Management
Space Permissions and Roles
The Space Permissions page shows the permissions assigned to users or groups for accessing or managing a specific space. This interface enables granting new permissions, as well as editing or revoking existing ones. Users or groups can be sourced from local directories or any integrated user directory like LDAP, Active Directory, or Entra ID.
Permissions in spaces are inherited downwards in the space hierarchy, with the ability to break inheritance to create unique permissions for the space, or to inherit permissions from the parent space.
The application supports the following space roles:
Administrator The Administrator role has full access to view and manage settings, management functions and assets of the space. |
Auditor The Auditor role has read only access to view settings, management configurations and assets of the space. |
---|---|
ServiceThe Service role has API access to the space. This Service role should be granted to accounts used in the configuration of remote nodes. | Space ManagerThe Space Manager role has access to view and manage sub-spaces of the given space. |
MFA ManagerThe MFA Manager role has access to view and manage the MFA configuration of the space. | Configuration ManagerThe Configuration Manager role has access to view and manage the integration configurations of the space. |
Directory ManagerThe Directory Manager role has access to view and manage the local user directories of the space. | Asset Type ManagerThe Asset Type Manager role has access to view and manage the asset types of the space. |
Taxonomy ManagerThe Taxonomy Manager role has access to view and manage the taxonomies of the space. | Asset ManagerThe Asset Manager role has access to view and manage the assets of the space. |
Permission ManagerThe Permission Manager role has access to view and manage the permissions of the space. | Task ManagerThe Task Manager role has access to view and manage scripts, parsers as well as asset type (with the Asset Type Manager role) and asset task lists (with the Asset Manager role or Asset Owner permission). |
Segmentation ManagerThe Segmentation Manager role configures, manages and executes segmentation policies of the space. | API Token ManagerThe API Token Manager role has access to view and manage space API tokens. |
Intelligent Tagging ManagerThe Intelligent Tagging Manager role has access to view and manage intelligent tagging rules. | Request ManagerThe Request Manager role has access to view and manage space Request Forms and space Form Selectors. Asset Role: Asset Manager or higher is required to manage asset level form selectors. |
Analytics ManagerThe Analytics Manager role has access to view, manage and build AI Models as well as to use AI Models and AI Clusters to classify and analyze space assets. |
View Space Roles
To view the currently configured Space Roles assigned within this Space:
- Log in to the Space with an Administrator, Permission Manager, or Auditor account.
- Navigate to Management > Space Roles.
From the list, each User or Group currently assigned a Space Role will be displayed. The table columns are:
- User or Group: Displays the User or Group that currently has an assigned Space Role.
- Type: Displays the type of the User or Group; User or Group.
- Directory: Displays the directory name from where this User or Group originates. Local indicates the Local User Directory, Master indicates from the base tenant, and <custom names> indicate from the Name value of an externally configured user directory.
- Permissions: Displays all the Space Roles assigned to this User or Group.
- Actions: Opens the Actions dropdown menu with available options:
- Edit: Allows the user to Edit the currently selected user's or group's assigned Space Roles.
- Revoke: Allows the user to Revoke this user or group from Space Roles, effectively removing all their Space Role assignments.
Grant Space Roles
To grant a User or Group a Space Role within the current Space:
- Log in to the Space with an Administrator or Permission Manager account.
- Navigate to Management > Space Roles and click the Grant button.
- Select the User or Group to apply the Space Role to using the User or Group field at the top of this form. The User or Group may originate from the local directory or any external directory configured with this tenant.
- After selecting the user or group, choose the Space Role(s) to assign by clicking the enable switch to the right of the role.
- To complete this operation, click the Grant button.
Revoking Space Roles
To revoke a User or Group a Space Role within the current Space:
- Log in to the Space with an Administrator or Permission Manager account.
- Navigate to Management > Space Roles, locate the User or Group that will have their Space Roles revoked, and open their Actions menu to the right side of this table.
- Select the Revoke option to remove their Space Roles.
To revoke the Space Roles of multiple Users or Groups:
- Log in to the Space with an Administrator or Permission Manager account.
- Navigate to Management > Space Roles, select all the Users or Groups that will have their Space Roles revoked by clicking the selection box to the left side of this table, and open the Mass Actions menu.
- Select the Mass Actions > Revoke option to remove the Space Roles from all selected Users or Groups.
Space Role Inheritance
Permissions in Spaces are inherited downwards in the space hierarchy by default, with the ability to break inheritance to create unique permissions for the space, or to re-inherit permissions from the parent space. Permission inheritance begins with the Root tenant Space and inherit down to all child spaces, unless or until this inheritance is broken on a child Space.
To break Space Role inheritance making a child Space have its own unique permissions:
- Log in to this Space with an Administrator or Permission Manager account.
- Navigate to Management > Space Roles, click on the Make Unique button.
- After the Make Unique operation completes, the inherited permissions from the parent Space are unique but remain configured for this Space. You may now update these unique Space Roles by revoking the once inherited permissions and granting new as needed.
Note
If you later decide that inheritance should be returned from the parent, you can use the Inherit button on this page to re-establish the parent-child Space role inheritance.
Re-establishing inheritance will remove all unique permissions from the child Space and re-inherit those from its parent, returning this child Space to the default inheritance of its parent.