Your browser does not allow storing cookies. We recommend enabling them.


System Permissions

Global system actions do not directly involve any specific hosts. These actions are selectable per admin group in the System permissions settings:

  • Changing the global settings of the Management Server (superuser group only)

  • Editing admin account permissions (superuser group only)

  • Delete log entries: deleting log entries

  • Manual grouping: manually grouping hosts

  • Edit auto assign rules: editing auto-assign rules

  • Manage host views and groups: creating, editing, and deleting host views and host groups

  • License Administration: administering licenses for managed software

  • Managed File Transfer functionality: permission to use the Managed File Transfer (MFT) features

  • File Transfer Logging: permission to view the collected file transfer logs and to configure the related settings

  • View Configurations: viewing Management Agent and managed software configurations (without deploying the changes)

  • Administer Configurations: commiting or reverting pending changes made by other users to Tectia 5.x configurations

  • Edit Configurations: creating, editing, and deleting Management Agent and managed software configurations (without deploying the changes)

  • View and generate reports: viewing and generating reports; the reports will include only data from those hosts that the admin is permitted to view

  • Manage Server Hierarchy: managing the Management Server hierarchy (Distribution Servers)

  • Deploy Management Agent: deploying Management Agent remotely via Tectia Manager to Unix hosts

  • View Audit Log: viewing the audit logs on Tectia Manager admin actions

  • View Event Log: viewing the Management Server system event log

  • Manage ICBs: creating and editing Initial Configuration Blocks (ICB)

  • Edit admin accounts, groups and permissions: administering the admin accounts and groups, editing their permissions. However, this does not give the permission to touch the superuser accounts, nor to elevate the administrators' own permissions to superuser level.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now