Contents
Tachyon roles
There are two types of Tachyon roles that can be applied to the Tachyon users, system roles and custom roles.
On the Roles page, you can see at a glance which Tachyon roles are system or custom roles, by using the icon in the Name column:
- System roles are indicated by an icon with a padlock
- Custom roles are indicated by an icon with a cog wheel
System roles
System roles are built-in and are not configurable, however they can be assigned to users the same as any other role. The following table lists the built-in system roles.
Tachyon system role | Permissions | Allows delegation | Description | Notes |
---|---|---|---|---|
All Instructions Actioner |
| Yes | Use Explorer, execute any Instruction (Action and Question), and view any Instruction response | Renamed in 8.0 - was Global Actioners. |
All Instructions Approver |
| Yes | Use Explorer, approve any Instruction for anyone other than self | Renamed in 8.0 - was Global Approvers. If email is enabled, this role will receive an approval request email for each requested action instruction. |
All Instructions Questioner |
| Yes | Use Explorer, ask any Question and view any Instruction response | Renamed in 8.0 - was Global Questioners. |
All Instructions Viewer |
| Yes | Use Explorer, view any Instruction response | Renamed in 8.0 - was Global Viewers. |
Full Administrator |
| No | Has all the permissions available in the Platform and its Applications | Renamed in 8.0 - was Global Administrators. |
Group Administrator |
| Yes | Add Users and Management Groups, and manage their roles and assignments, below this Group Administrator's assigned Management Group(s) | New role in 8.0 This role is similar to previous Management Group Administrators role, with permissions extended to support using Management Groups for RBAC, however the role is only allowed to manage Management Groups below the Management Groups they have been assigned to. |
Guaranteed State Administrator |
| No | Use Guaranteed State, manage Rules and Polices, and assign and deploy Policies | Renamed in 8.0 - was Guaranteed State Administrators. |
Guaranteed State Policy Assigner |
| Yes | Assign Policies to Management Groups (does not allow use of Guaranteed State) | New role in 8.0 |
Guaranteed State User |
| No | Use Guaranteed State, view dashboards | Renamed in 8.0 - was Guaranteed State Viewers. |
Installer |
| No | Install and upgrade the Platform and Applications, register Consumers, upload Product Packs, manage Instruction Sets, and configure Roles and Permissions | New role in 8.0 |
Inventory Administrator |
| No | Manage Inventory repositories - populate and archive them - export data - manage Inventory associations | Renamed in 8.0 - was Inventory Administrators. |
Inventory User |
| No | View Inventory repositories, data and Inventory associations | Renamed in 8.0 - was Inventory Viewers. |
Tachyon System |
| No | For service and equivalent accounts to perform Tachyon system operations | New role in 8.0 |
Questions, responses, actions are examples of securables. Other Consumers may create their own system roles and securables.
When upgrading from Tachyon Platform 5.2 or earlier, roles names are automatically renamed as listed above. Other roles are deleted during the upgrade, unless they have members.
Custom roles
Custom roles can be edited, allowing you to add or remove permissions if you require. used to define who is able to use specific Instruction Sets to ask questions, run actions or approve actions. For more information please refer to the Defining custom Tachyon roles heading on this page.
The following table lists built-in custom roles used by Tachyon Applications.
Tachyon custom role | Permissions | Allows delegation | Description | Notes |
---|---|---|---|---|
1E ITSM Connect Actioner |
| Yes | The ServiceNow proxy user is added to this role instead of All Instructions Actioner so that ServiceNow users can only use instructions belonging to instruction sets assigned to this role | The ServiceNow proxy user is added to this role instead of All Instructions Actioner so that ServiceNow users can only use instructions belonging to instruction sets assigned to this role. |
AppClarity Administrator |
| No | Create, update, delete and view AppClarity Compliance, Entitlement, License Demand and Reclaim - view and export Inventory - view, edit, delete and export Associations | Renamed in 8.0 - was AppClarity Administrators. |
Application Migration Administrator |
| No | Create, update, delete and view Application Migration Rules and Role Based Application Sets to manage installations in your estate during operating system deployment | Renamed in 8.0 - was Application Migration Administrators. |
Compliance Administrator |
| No | Create, update, delete and view AppClarity Compliance, Entitlement and License Demand - view AppClarity Reclaim - view and export Inventory - view, edit, delete and export Associations | Renamed in 8.0 - was Compliance Administrators. |
Compliance Viewer |
| No | View AppClarity Compliance, Entitlement and License Demand | Renamed in 8.0 - was Compliance Viewers. |
Entitlement Administrator |
| No | Create, update, delete and view AppClarity Entitlement - view and export Inventory - view, edit, delete and export Associations | Renamed in 8.0 - was Entitlement Administrators. |
Experience Administrator |
| No | Use Experience, manage, assign and deploy Engagements (Surveys and Announcements), and manage Metrics | New role in 8.0 Effectively a combination of previous Survey Administrators and VDI Administrators roles. |
Experience Engagement Assigner |
| Yes | Assign Engagements to Management Groups (does not allow use of Experience) | New role in 8.0 |
Experience User |
| No | Use Experience, view Survey responses, and view Metrics | Renamed in 8.0 - was Experience Viewers. |
Nomad Administrator |
| No | Use Nomad, manage Pre-cache jobs, view the results of related Instructions and Client health policies | Renamed in 8.0 - was Nomad Administrators. Instruction set assigned manually after installlation. |
Patch Success Administrator |
| No | Use Patch Success, manage and populate its Repository, and deploy Policies, use Explorer to deploy patches | New role in 8.0 Instruction set assigned manually after installlation. |
Patch Success User |
| No | Use Patch Success, and use Explorer to ask about Patch status on devices | Renamed in 8.0 - was Patch Success Viewers. Instruction set assigned manually after installlation. |
Reclaim Administrator |
| No | Create, update, delete and view AppClarity Reclaim - view and export Inventory - view, edit, delete and export Associations | Renamed in 8.0 - was Reclaim Administrators. |
Reclaim Viewer |
| No | View AppClarity Reclaim | Renamed in 8.0 - was Reclaim Viewers. |
Considerations when using the Full Administrator role
The Full Administrator role can be used to provide across the board permissions to a user. While this may be convenient in certain circumstances, you should be aware that this is a powerful role and should be used with appropriate caution.
Using Full Administrator in a lab environment
To get things up and running quickly in a lab environment, you may want to make use of the full administrator role. This will help minimize the number of users required for an evaluation and reduce the initial configuration required.
To further minimize the number of users needed, you can also enable the Windows account used to install Tachyon to assume the Tachyon full administrator role. The installation account is added as the system principal user in Tachyon by the installer, and its Tachyon permissions are locked down by default. You can allow it to assume the full administrator role using the following steps:
- Create a Tachyon user from an existing AD security group.
- Apply the Tachyon full administrator role to the user.
- Add the installation account to the AD security group.
In the short term it's fine to make use of full administrators in this way, but this practice is not really suitable for large-scale deployments and should be used with care for the following reasons:
- The full administrator role has permissions to do everything in Tachyon. It has across the board permissions to all Instruction Sets and therefore can be used to run actions that can have a major impact on your network.
- The full administrator accounts receive emails for all the transactions that are performed by Tachyon.
Different approaches for defining permissions
Tachyon provides a flexible system for defining permissions for the Tachyon features. There are a number of different ways of approaching the task, here we outline the general choices that can be made for assigning Tachyon users to system and custom roles.
Managing access primarily using the Tachyon Permissions console
In this approach, Tachyon users are added individually using their Active Directory credentials. This approach is more secure than alternatives because all users, roles and access rights are managed only through the Tachyon Permissions console.
Managing access using Active Directory
Using this approach, Tachyon users are added as Active Directory security groups. Tachyon roles are then associated with those groups, and management of the individual users who can access Tachyon is subsequently done only through Active Directory. There are broadly three options when using this approach:
- A one-to-one approach where you create a Tachyon-specific role-based Active Directory group for each Tachyon role. For example, you could create a TCNGApprovers Active Directory security group, and add that group as a user in Tachyon, and then assign the Tachyon All Instructions Approver role to the user.
- A many-to-one approach, where you use one or more of your existing role-based Active Directory groups for each Tachyon role. For example, you could use the Active Directory groups for your desktop and help desk teams, create a Tachyon user for each group, and then assign the Tachyon role to all those Tachyon users.
- A mixture of the above
It is possible for an Active Directory user to be associated with Tachyon roles for both running and approving actions. In practice, this is safe because Tachyon prevents users from being able to directly approve their own actions regardless of the roles they have been assigned.
Defining a custom Instruction set Tachyon role
If you want to base your Tachyon permissions around access to specific Instruction sets, you will need to create custom Tachyon roles. The Custom Roles section lists built-in custom roles used by Tachyon Applications.
To create a custom role:
- Navigate to the Settings→Permissions→Roles page.
- Click the Add button to start the add role process.
- In the New Role page subsequently displayed set the Name and Description.
- With the Instruction Sets tab selected, select your required Instruction Sets from the list.
- Set the Instruction set access rights by checking the required Actioner, Approver, Questioner and Viewer checkboxes.
- When the associated rights have been set click Save to save your changes and automatically return to the Roles page.
- You can now add assignments of users and groups and management groups to the new custom role by clicking the link in the Assignments column.
- Click the + (plus icon) to add a new item and, from the Users and Groups drop-down menu either search for, or select the users or groups you want to associate the role with.
- From the Management Group drop-down menu either search for, or select the management group you want to associate the role with. This can either be the built-in All Devices or a management group you have created in Settings→Permissions→Management groups.
- Click the Save button to associate the selected options with the custom role.
The following rights can be set for an Instruction set, these relate to the primary operator roles of the Tachyon system:
Right | Description |
---|---|
Actioner | Able to run actions defined in the Instruction Set. |
Approver | Able to approve actions defined in the Instruction Set for anyone other than self. If email is enabled, will receive an approval request email for each requested action in the Instruction Set. |
Questioner | Able to ask questions defined in the Instruction Set. |
Viewer | Able to view responses to questions run from the Instruction Set. |
For details about how to load Instruction Definitions into Tachyon and then create, populate and delete Instruction sets, refer to the Instruction Menu page.