Roles and permissions
For accessing and completing actions with IBM Cloud Pak® for AIOps, users require specific roles and permissions. Review the different available roles, permissions, and the associated actions that users can complete with the roles and permissions. These roles and permissions help you get your users set up to begin day to day operations.
- Predefined roles
- Creating a role
- Permissions
- Assigning roles and permissions to users
- Viewing your permissions
- Red Hat OpenShift Container Platform roles
Predefined roles
A role defines the permissions that a user or group has. You can edit the roles that are available by default roles or create roles if the default set of permissions for a role does not align with your business needs.
The following roles are available by default:
- Administrator
- Automation Administrator
- Automation Analyst
- Automation Developer (AIOps Developer role)
- Automation Operator
- Service Administrator
- User
Notes:
-
Service Administrator: Users with the Service Administrator role do not have permission to add or update a role, or view the details of a user's assign role. If a user with the Service Administrator role selects to view details about a role when viewing details about a user group, a 401 error page is instead displayed.
-
Automation Analyst and User: These predefined roles are available by default but do not include any permissions for completing actions within IBM Cloud Pak for AIOps.
These default roles are used within the IBM® Automation family of offerings, which includes IBM Cloud Pak for AIOps, however, these roles are not used within IBM Cloud Pak for AIOps. If more IBM Cloud Paks are installed, these roles can have permissions for completing actions within tools for those other IBM Cloud Paks.
As these roles do not include or provide any permissions within IBM Cloud Pak for AIOps, do not assign the roles to users within IBM Cloud Pak for AIOps.
-
Not all permissions are associated with a predefined role. A user with with a permission to manage roles, such as the Administer platform permission, can assign permissions to a role when needed.
Default user
The default user (admin
) is automatically assigned the following roles when the roles are added to the platform:
- Administrator
Creating a role
If the existing default roles are not sufficient for your needs, you can create a role for your users. In addition, when you are adding a user, you can choose to create a role for that user instead of assigning an existing role.
The settings for creating a role are the same regardless of the path you select to create the role.
To directly create a role, complete the following steps:
-
Log in to the console as an administrator with permissions to manage users.
Required permissions: To manage access to the Cloud Pak for AIOps console, you must have one of the following permissions:
- Administer platform
- Manage platform roles
-
From the main navigation, click Administration > Access control.
-
Select the Roles tab and click New role.
-
Enter the details for the new role:
-
Name - Enter a distinctive and descriptive name for the role.
-
Description - Enter an optional description for the role to define the role, such as to identify the objective or responsibilities for users with the role.
-
-
Click Next.
-
Select the permissions for the role. You can use the Find permissions search field to find and filter the list of permissions.
-
Click Next.
-
Review the details for the role and click Create.
Permissions
The following table describes the actions that are associated with each permission.
AI models
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Manage AI models | (1) | X | X | X | ||
View AI models status | (2) | X | X | X | X |
-
Manage AI models
Users with this permission can complete the following actions:
- Gather and prepare AI training data
- Train AI models
- Deploy AI models
-
View AI models status
Users with this permission can complete the following actions:
- View AI model status
Resource management (Applications)
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Manage applications | (1) | X | X | X | X | |
Manage resource group templates | (2) | X | X | X | ||
Manage topology comments | (3) | X | X | X | X | X |
View topologies | (4) | X | X | X | X | X |
-
Manage applications
Users with this permission can manage applications and related settings. Users with this permission can complete the following actions:
- View applications and resources
- Create applications
- Edit applications
- Delete applications
-
Manage resource group templates
Users with this permission can manage templates that define how resources are organized into resource groups. Users with this permission can complete the following actions:
- View resource group templates
- Create resource group templates
- Edit resource group templates
- Delete resource group templates
-
Manage topology comments
Users with this permission can manage comments on resources included in a topology. Users with this permission can complete the following actions:
- View topology comments
- Create topology comments
-
View topologies
Users with this permission can view application topologies. Users with this permission can complete the following actions:
- View topologies
Basic operations
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
View operational data | (1) | X | X | X | X | X |
Manage operational data | (2) | X | X | X | X | X |
Use AIOps Insights | (3) | X | X | X | X | X |
-
View operational data
Users with this permission have the following read-only access in IBM Cloud Pak® for AIOps:
- View alerts
- View incidents
- View alert filters
- View incident filters
- View alert views
- View incident views
-
Manage operational data
In addition to the View operational data permissions, users with this permission can perform the following actions:
- Update alerts (Execute right-click actions)
- Update incidents (Change priority, change state, assign, etc.)
- Add/Edit/Delete alerts filters
- Add/Edit/Delete alerts views
- Add/Edit/Delete incidents filters
- Add/Edit/Delete incidents views
- Add/Edit/Delete right-click actions
-
Use AIOps Insights
Use the AIOps Insights dashboard to view productivity metrics such as mean time to restore, incident activity, noise reduction, and runbook usage.
- Use AIOps Insights
Integrations
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Manage integrations | (1) | X | X | X | ||
View integrations | (2) | X | X | X | X |
-
Manage integrations
Users with this permission can manage integrations to infrastructure, log, event, source code, and chat management tools. Users with this permission can complete the following actions:
- View integrations
- Create integrations
- Edit integrations
- Delete integrations
-
View integrations
Users with this permission can view integrations to infrastructure, log, event, source code, and chat management tools. Users with this permission can complete the following actions:
- View integrations
Operational policies
This permission is required for viewing policy-related information that can be displayed within the details for an application incident.
Attention: To access Automations in the main navigation menu, the Use runbooks permission is required in conjunction with the Operational policy roles. For more information, see Runbook permissions.
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Delete operational policies | (1) | X | X | X | X | |
Edit operational policies | (2) | X | X | X | X | |
View operational policies | (3) | X | X | X | X | X |
-
Delete operational policies
Users with this permission can delete policies for promoting alerts to incidents. Users with this permission can complete the following actions:
- Delete operational policies
-
Edit operational policies
Users with this permission can edit policies for promoting alerts to incidents. Users with this permission can complete the following actions:
- Edit operational policies
-
View operational policies
Users with this permission can view policies for promoting alerts to incidents. User with this permission can complete the following actions:
- View operational policies
Platform administration
Permissions in this category enable an administrator to configure, customize, monitor, and manage the platform.
Only the Administer platform permission is associated with a predefined role (Adminstrator). This permission includes all other platform administration permissions.
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Administer platform | (1) | X | ||||
Manage configurations | (2) | |||||
Manage platform health | (3) | |||||
View platform health | (4) |
-
Administer platform
This permission offers the most comprehensive set of actions for managing and monitoring the platform. Users with this permission have elevated privileges and can grant or revoke all permissions, including other administrative permissions. Users with this permission can complete the same actions as users that have the following permissions:
- Manage configurations (Administer platform)
- Manage platform health (Administer platform)
- Manage platform roles (User administration)
- Manage users (User administration)
- Manage user groups (User administration)
- Manage service instances (Service instances)
-
Manage configurations
Users with this permission can customize the platform, integrate the platform with other applications, and enable connections to unsupported data sources. Users with this permission can access the Customizations page, the Configurations page, and the JDBC drivers tab on the Platform connections page. Some actions require specific services to be installed. Users with this permission can complete the following actions:
-
Configure connection to SMTP server
Note: Requires Watson Studio or Watson Knowledge Catalog. An SMTP connection enables the platform to send emails.
-
Configure integration with IBM Guardium appliances
Note: Requires Watson Knowledge Catalog. Use IBM Guardium to audit access to sensitive data on remote databases.
-
Configure connections to Hadoop clusters
Note: Requires Execution Engine for Apache Hadoop.
-
Customize branding
-
Enable and disable home page cards
-
Enable and disable default support links
-
Add and delete custom support links
-
Enable and disable guided tours
-
Import JDBC drivers
Note: Requires the common core services. JDBC drivers enable users to connect to unsupported data sources.
-
-
Manage platform health
Users with this permission can monitor resource use, set quotas and alerts, manage workloads to maintain the health of the platform, and gather diagnostic data when problems occur. Users with this permission can access the Monitoring page and the Diagnostics page. Users with this permission can complete the following actions:
-
Monitor workloads and resource use
Note: Workloads include active runtimes and jobs. Resources include memory and vCPU use across services, instances, and environments.
-
Stop any runtime environment
Note: Environments are hardware and software configurations defined for running analytical assets or jobs.
-
View pod status, details, and logs
Note: Services are composed of Kubernetes pods. A pod is an instance of a process that runs on the cluster.
-
Restart pods
-
View platform quotas and service quotas
Note: A quota specifies the maximum amount of memory or vCPU that the platform or a service should use.
-
View event history and alerts
-
Set and edit platform resource quotas
-
Set and edit individual service resource quotas
-
Create and run diagnostics jobs
Note: A diagnostic job gathers information that can be used for troubleshooting problems.
-
Delete diagnostics jobs
-
-
View platform health
Users with this permission can monitor resource use and workloads across the platform to gauge the health of the platform. Users with this permission have read-only access to the Monitoring page. Users with this permission can complete the following actions:
-
Monitor workloads and resource use
Note: Workloads include active runtimes and jobs. Resources include memory and vCPU use across services, instances, and environments.
-
View pod status, details, and logs
Note: Services are composed of Kubernetes pods. A pod is an instance of a process that runs on the cluster.
-
View platform quotas and service quotas
Note: A quota specifies the maximum amount of memory or vCPU that the platform or a service should use.
-
View event history and alerts
-
Profiles
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Manage profiles | (1) | X |
-
Manage profiles.
Users with this permission can complete the following actions using filtering and redacting:
- Limit the access a user/group has to see alerts
- Limit the access a user/group has to see incidents
- Limit the access a user/group has to see topology/inventory
Runbooks
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Administer runbooks and runbook application | (1) | X | X | X | ||
Author and manage runbooks | (2) | X | X | X | ||
Author runbooks | (3) | X | X | X | X | |
Use runbooks | (4) | X | X | X | X | X |
View runbooks | (5) | X | X | X | X | X |
-
Administer runbooks and runbook application
Users with this permission can complete the following actions:
- View draft and published runbooks
- Run draft and published runbooks
- Create draft runbooks
- Edit draft runbooks
- Approve draft runbooks
- Delete draft and published runbooks
- Edit integrations
- Edit global settings
- Edit group ownership
-
Author and manage runbooks
Users with this permission can complete the following actions:
- View draft and published runbooks
- Run draft and published runbooks
- Create draft runbooks
- Edit draft runbooks
- Approve draft runbooks
- Delete draft and published runbooks
-
Author runbooks
Users with this permission can complete the following actions:
- View draft and published runbooks
- Run draft and published runbooks
- Create draft runbooks
- Edit draft runbooks
-
Use runbooks
Users with this permission can complete the following actions:
- View published runbooks
- Run published runbooks
-
View runbooks
Users with this permission can complete the following actions:
- View published runbooks
Secure tunnel
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Install tunnel connectors | (1) | X | X | X | ||
Manage tunnel applications | (2) | X | X | X | ||
Manage tunnel connections | (3) | X | X | X | ||
Manage tunnel templates | (4) | X | X | X | ||
Renew certificates | (5) | X | X | X | ||
View tunnel audit logs | (6) | X | X | X |
-
Install tunnel connectors
Users with this permission can install tunnel connectors on remote clusters or hosts. Users with this permission can complete the following actions:
- Install tunnel connectors
-
Manage tunnel applications
Users with this permission can manage application traffic at the address or port level. Users with this permission can complete the following actions:
- View application mappings
- Create application mappings
- Edit application mappings
- Delete application mappings
-
Manage tunnel connections
Users with this permission can manage connections to remote clusters or hosts. Users with this permission can complete the following actions:
- View tunnel connections
- Create tunnel connections
- Edit tunnel connections
- Delete tunnel connections
-
Manage tunnel templates
Users with this permission can manage templates that simplify the creation of tunnel connections. Users with this permission can complete the following actions:
- View tunnel templates
- Create tunnel templates
- Edit tunnel templates
- Delete tunnel templates
-
Renew certificates
Users with this permission can renew certificates for tunnel connections. Users with this permission can complete the following actions:
- Renew certificates for tunnel connections.
-
View tunnel audit logs
Users with this permission can view a history of user-driven operations and tunnel connection events. Users with this permission can complete the following actions:
- View tunnel audit logs
Service instances
The service instance permissions are included through the underlying IBM Cloud Pak foundational services that is installed with IBM Cloud Pak for AIOps. These permissions are not used within IBM Cloud Pak® for AIOps:
- Create service instances
- Manage service instances
If more IBM Cloud Paks are installed, these permissions can be required for completing actions within tools for those other IBM Cloud Paks.
As these permissions are not used within IBM Cloud Pak for AIOps, do not assign the permissions to any roles that you create unless they are required for use with another installed IBM Cloud Pak.
Topology administration
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Manage advanced topology settings | (1) | X | X | X | ||
Manage topology presentation | (2) | X | X | X | ||
Manage topology rules | (3) | X | X | X | ||
Manage topology tools | (4) | X | X | X |
-
Manage advanced topology settings
Users with this permission can define global preferences for creating and using topologies. Users with this permission can complete the following actions:
- View advanced topology settings
- Edit advanced topology settings
-
Manage topology presentation
Users with this permission can define how topologies are presented to end users. Users with this permission can complete the following actions:
- View topology presentation settings
- Create topology presentation settings
- Edit topology presentation settings
- Delete topology presentation settings
-
Manage topology rules
Users with this permission can define how resources are processed to enable event correlation, tagging of resources, and the creation of end-to-end topologies. Users with this permission can complete the following actions:
- View topology rules
- Create topology rules
- Edit topology rules
- Delete topology rules
-
Manage topology tools
Users with this permission can define custom actions for resources that are included within topologies. Users with this permission can complete the following actions:
- View topology tools
- Create topology tools
- Edit topology tools
- Delete topology tools
User administration
User administration permissions enable an administrator to manage users, groups, and roles. These permissions apply to the platform. Service instances and workspaces such as projects, catalogs, and deployment spaces have their own access controls.
Permissions | Actions | Automation Developer | Automation Operator | Service Administrator | Automation Administrator | Administrator |
---|---|---|---|---|---|---|
Manage platform roles | (1) | |||||
Manage user groups | (2) | X | ||||
Manage users | (3) | X |
-
Manage platform roles
Users with the Manage platform roles permission can access the Roles tab on the Access control page to modify platform roles or create custom roles. Roles determine the permissions that a user or user group has. This permission does not apply to service instances or assets, such as projects, catalogs, and deployment spaces. Users with this permission can complete the following actions:
- Create platform roles
- Edit platform roles
- Delete platform roles
-
Manage user groups
Users with the Manager user groups permission can access the User groups tab on the Access control page to manage user groups. User groups make it easier to manage the roles (and permissions) of users with similar access requirements. Users with this permission can complete the following actions:
- Create user groups
- Edit user groups
- Delete user groups
- Assign roles to user groups
- Remove roles from user groups
-
Manage users
Users with the Manager users permission can access the Users tab on the Access control page, and can onboard users to the platform. Users with this permission can complete the following actions:
- Add users
- Edit user profiles
- Assign roles to users
- Remove roles from users
- Remove users
What permissions do I have?
You can see what permissions you have from your profile. Your permissions are determined by the roles that are assigned to you.
To see what roles are assigned to you:
- Log in to the IBM Cloud Pak for AIOps console and click your avatar in the upper right of the toolbar.
- Click Profile and settings.
- Click the Roles tab.
The permissions that are associated with your role (or roles) are listed in the Enabled permissions column.
Adding users
To add users, you need to have an external LDAP server set up for creating user profiles and authentication. When a user record is included within the LDAP server, you can add the user account within the IBM Cloud Pak for AIOps console. You can add a user directly or as part of an LDAP group. For more information, see Adding users.
Assigning roles and permissions
When you add a user or group, you must specify the role and permissions that they have. These roles and permissions can be granted to users through a combination of the Cloud Pak for AIOps console and an external LDAP server for managing user authentication.
Red Hat OpenShift Container Platform roles
To add and manage users and roles for accessing and using the Red Hat OpenShift Container Platform web console, you need to use the Red Hat role-based access control (RBAC). For more information, see the Red Hat OpenShift topic Using RBAC to define and apply permissions .