Assign User Permissions
You can control user permission levels by creating and assigning security roles. These roles regulate access to the Meridian web UI and the REST API to exchange monitoring and inventory information.
In a distributed installation, Minion instances require an account that is assigned the ROLE_MINION
security role to interact with Meridian.
You can create one account for all Minions to share, or one account per Minion.
Built-in security roles
The following security roles are built in to Meridian by default. Those marked with an asterisk are the most commonly used.
Security Role | Description |
---|---|
ROLE_ADMIN * |
Permissions to create, read, update, and delete items via the web UI and the REST API (see |
ROLE_ASSET_EDITOR |
Permissions only to update asset records from nodes. |
ROLE_FILESYSTEM_EDITOR |
Permissions only to view and update file configuration data via the REST API. |
ROLE_DASHBOARD |
Permissions only to view the dashboard. |
ROLE_DELEGATE |
Permissions to perform actions (such as acknowledging an alarm) on behalf of another user. |
ROLE_DEVICE_CONFIG_BACKUP |
Permissions to view and trigger device configuration backups. |
ROLE_FLOW_MANAGER |
Permissions to edit flow classifications. |
ROLE_JMX |
Permissions to retrieve JMX metrics. Does not allow the user to run Meridian JVM MBeans, even if they return only simple values. |
ROLE_MINION |
Minimum permissions required for a Minion to operate. |
ROLE_MOBILE |
Permissions to use OpenNMS COMPASS mobile application to acknowledge alarms and notifications via the REST API. |
ROLE_PROVISION |
Permissions to use the provisioning system and configure SNMP in Meridian to access management information from devices. |
ROLE_READONLY * |
Permissions only to read information in the web UI. Does not allow user to change alarm states or notifications. |
ROLE_REPORT_DESIGNER |
Permissions to manage reports in the web UI and REST API. |
ROLE_REST |
Permissions to interact with the entire Meridian REST API. |
ROLE_RTC * |
Permissions to exchange information with the Meridian Real-Time Console for availability calculations. |
ROLE_USER * |
Default permissions for a new user to interact with the web UI. Allows users to escalate and acknowledge alarms and notifications. |
Assign security roles
Follow the steps below to assign security roles to user accounts:
-
Click the gear symbol at the top-right of the screen.
-
Under Configure OpenNMS, click
. -
Find the user to whom you want to assign a security role and click Modify beside their name.
-
Select the role to add to the user account from the Available Roles list, and click Add.
-
Follow this step to add as many roles as necessary to the account.
-
-
Click Finish to apply the changes.
-
Log out of Meridian and log back in to apply the new security role settings.
Create custom security roles
To create a custom security role, you need to define its name and specify the permissions it will provide. Follow the steps below to create a custom role:
-
Create
${OPENNMS_HOME}/etc/security-roles.properties
in your OpenNMS directory. -
Add a
roles
property, and enter a comma-separated list of the custom security roles for its value:Example of aroles
propertyroles=operator,stage
-
Save the file.
To define permissions associated with a custom security role, you must manually update the Spiring security application context in ${OPENNMS_HOME}/jetty-webapps/opennms/WEB-INF/applicationContext-spring-security.xml .
|