Owner's Manual
216 Ensuring a Secure Dell OpenManage IT Assistant Installation
Role-Based Access Security Management
IT Assistant provides security through role-based access control (RBAC),
authentication, and encryption.
Role-Based Access Control
RBAC manages security by determining the operations that can be executed
by persons in particular roles. Each user is assigned one or more roles, and
each role is assigned one or more user privileges that are permitted to users in
that role. With RBAC, security administration corresponds closely to an
organization's structure.
User Privileges
IT Assistant grants different access rights based on the user's assigned group
privileges. The three user levels are: User, Power User, and Administrator.
Users have read-only access to all IT Assistant information.
Power Users can create tasks for immediate execution. They cannot modify
discovery configuration settings, modify alert management settings, or
schedule or delete tasks.
Administrators can perform all IT Assistant tasks and functions.
Microsoft Windows Authentication
For supported Windows operating systems, IT Assistant authentication is
based on the operating system's user authentication system using Windows
NT
®
LAN Manager (NTLM) modules to authenticate. This underlying
authentication system allows IT Assistant security to be incorporated in an
overall security scheme for your network.