Tachyon Users and Roles
1E ITSM Connect provides ServiceNow with access to Tachyon instructions in order to ask questions about devices and run actions . It does this by using a proxy user specified in Tachyon which act on behalf of the ITSM Connect app user in ServiceNow. You have a choice of how to configure the proxy user in Tachyon, depending on whether you want ServiceNow users to run any instruction on any device, or only have access to some instructions or some devices. Either way, your Tachyon Administrator will need to create a Tachyon user with its own domain account. This proxy user can be regarded as a service account and does not require an email address.
Within Tachyon access to instructions and devices are permissioned using roles. The following picture describes how 1E ITSM Connect app roles map to Tachyon users and their roles:1E ITSM Connect app roles.
The following table describes theRole name | Additional ServiceNow roles required | Description |
---|---|---|
x_1e_connect.Tachyon_Admin | <None> | This role allows its users to configure the 1E ITSM Connect app, in addition to having the same rights as the x_1e_connect.Tachyon_User role. ServiceNow admin users must change their application scope to 1E ITSM Connect in order to configure the app, and retrieve instructions. |
x_1e_connect.Tachyon_User | ITIL (for access to ITSM incidents) | This role grants its users access to incidents and the ability to run Tachyon instructions. This role maps on to the proxy Tachyon actioner. |
x_1e_connect.Tachyon_Approver | <None> | This role allows its users to approve Tachyon instructions that require approval. |
x_1E_core_connect.user | <None> | When adding any of the above roles to a user, the x_1E_core_connect.user role is also inherited automatically. Please refer to 1E Core: Requirements for more details. |