Skip to main content

User access management

Assign privileges based on user’s role in the company

User management describes the ability of administrators to manage user access to various IT resources. User administration is a central component of every Internet-enabled application/solution. Controlling and managing user access to IT resources is a fundamental security criterion for any organization. User management allows administrators to control user access and enable/disable users on IT resources. A local directory service then authenticates, authorizes, and verifies user access to IT resources based on the specifications set by the IT administrator.

 

7GFuse User access management

7G Fuse devices are equipped with a user management system at a granular level

7G Fuse has a user role management system that defines what a particular user can and cannot do on your device. Knowing these user roles and permissions is important as your configuration grows.

There are 2 different types of roles provided by the system

Administrator

The administrator is the most powerful user role. Users with the administrator role can add, delete, and edit any configuration. In addition, an administrator can add new users to the device, change information about existing users including their passwords, and delete any user (including other administrators). This role is generally reserved for the technical administrators of the device and gives you full control over your device.

View

Users with the view role can log in to the device and view only the device’s configurations and statistics. They can change their passwords if they wish. They cannot add, edit or delete configurations or do anything else in the admin area. This user role is particularly useful if users are only to log in for monitoring purposes.

User access management
Assign privileges based on user’s role in the company

User management describes the ability of administrators to manage user access to various IT resources. User administration is a central component of every Internet-enabled application/solution. Controlling and managing user access to IT resources is a fundamental security criterion for any organization. User management allows administrators to control user access and enable/disable users on IT resources. A local directory service then authenticates, authorizes, and verifies user access to IT resources based on the specifications set by the IT administrator.

 

7GFuse User access management

7G Fuse devices are equipped with a user management system at a granular level

7G Fuse has a user role management system that defines what a particular user can and cannot do on your device. Knowing these user roles and permissions is important as your configuration grows.

There are 2 different types of roles provided by the system

Administrator
Users with the view role can log in to the device and view only the device’s configurations and statistics. They can change their passwords if they wish. They cannot add, edit, or delete configurations or do anything else in the admin area. This role is generally reserved for the technical administrators of the device and gives you full control over your device.
View
Users with the view role can login to the device and just view configurations and statistics of the device. They can change their passwords if they want to. They cannot add, edit or delete configurations or do anything else inside admin area. This user role is particularly useful if you require users to login for monitoring purposes only.