15-4
Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance
OL-26645-02
Chapter 15 Managing the ACE Appliance
Controlling Access to the Cisco ACE Appliance
Thus, role-based access control ensures that users can view only the devices or services or perform the
actions that are included in the domains to which they have been given access.
Figure 15-1 Role-Based Access Control Containment Overview
The following is an example of role-based access control containment.
All other user interfaces, such as configuration, monitoring, and administration, respect this role-based
access control policy:
• Roles limit the screens (or functions on those screens) that a user can see.
• Domains limit the objects that are listed on any screen that the roles allow.
• Users (other than the administrator) can create only subdomains of the domains to which they are
assigned. However, no parent/child relationship is kept between domains.
• The system administrator user (Admin) can see and modify all objects. All other users are subject
to the role-based access controls illustrated in Figure 15-1.
System
Inheritance
Virtual contexts:
Used to virtualize services
Objects contained withn a Virtual context
System Objects
Users
Roles
Domains
Rules
Network
Objects
All associations are one-to-many reading from
the top down unless noted otherwise
182039
Domains
East Coast servers Central servers West Coast servers
Role
Web server administrator
Users
User A User B User C
Note Each association is one-to-many.
Comments to this Manuals