RBAC delegation / UserVoice website RRS feed

  • Question

  • Hello,

    Two different questions / suggestions.

    For now, delegation to access the web console is quite limited... It would be great to introduce more granularity. Something like:

    1. Full admin (can configure all settings, etc.)
    2. Operator (timeline read access + permissions to change alert state)
    3. Reporter(timeline read access only)

    Generally speaking, your solution looks very promising but still lacks many essential features to be ready for production in complex environment. Do you plan to open a UserVoice suggestion website for that new product ? It would be great to submit ideas as far as you are commited to listen to your customers.



    • Edited by Sylvain06 Friday, May 15, 2015 2:27 AM
    Friday, May 15, 2015 2:27 AM

All replies

  • We love listening to our customers feedback and ideas! The more people put their mind to it the better the product would eventually be, right?

    Regarding the web console delegation - I fully understand your concerns and we'll definitely look into enabling this. Just to better understand - which roles in your org would you assign to to each "ATA role"? Does not having UI access delegation is a blocker for you deploying ATA?

    Having a UserVoice site is a great idea! Let us have a look into the internal policies/usage of UserVoice and figure out how can we use that.


     Microsoft ATA Team.
    Monday, May 18, 2015 8:10 AM
  • Hello Michael,

    To answer your questions, here is a possible high-level mapping...

    • Full admin (can configure all settings, etc.) --> team in charge of deploying and managing ATA (adding new gateways, etc.), likely our Active Directory team.
    • Operator (timeline read access + permissions to change alert state) --> People from AD and Security team in charge to follow-up / handle alerts generated by ATA
    • Reporter(timeline read access only) --> Additional people that might be interesting to leverage ATA information for their daily activities (security team, misc. admins, etc.)



    Monday, May 18, 2015 10:02 AM