Specifications

CHAPTER 9: POLICIES 101
Chapter 9: Policies and Node Groups
Controlling Access Using Policies
Configuring policies to provide user access to nodes is optional, but central to making effective
use of CC-SG’s ability to control access.
If you want to give all users access to all nodes, simply assign the Full Access Policy to all user
groups. If you want to have more control over user access to nodes you will need to create
policies to define rules for access. Like privileges, policies are assigned to user groups to apply
those access rules to the users in the group.
If you completed Guided Setup (Please refer to Chapter 3: Configuring CC-SG with Guided
Setup), a number of basic policies may already have been created. Now, you may want to apply
these policies to existing user groups. If you have not used Guided Setup or created the desired
policies you will want to follow the directions below. You will:
Create Node Groups to organize the nodes you want to create access rules for.
Create Device Groups if you want to create access rules for Raritan devices providing
interfaces to nodes.
Create a policy for a node or device specifying when access to that node or device can occur.
Apply the policy to a user group.
Policy Summary
The following diagram is a visual representation of how to implement security with CC-SG:
Figure 87 Policy Summary