Skip to main content

Create, assign, and manage roles

Roles control the operations that a user can perform in their Identity as a Service account. A role defines a list of system entities and permissions for those entities. System entities identify different Identity as a Service management areas. For example, a user assigned the User Passkey/FIDO2 Token Management entity can view, add, edit, remove, or perform all actions on a Passkey/FIDO2 token, depending on the permissions assigned to that role.

There are five system-defined roles, which cannot be changed. Administrators can also create custom roles. Changes to a role take effect the next time the user logs in. System-defined Identity as a Service roles and roles assigned to user accounts that are synchronized with Active Directory cannot be changed.

System-defined roles include:

  • Auditor: This role gives view-only access to the features available on the administrator portal. It has the Manage All Roles permission setting enabled by default.
  • Super Administrator: This role provides full access to the features available on the administrator portal. It has the Manage All Roles setting enabled by default.
  • Help Desk Administrator: Administrators assigned the Help Desk Administrator role can manage other user accounts with the Auditor and Help Desk Administrator roles and those without a role (end users). They cannot manage users with Super Administrator or custom roles. The Manage All Roles setting cannot be modified for this role.
  • SCIM Provisioning: This role allows the SCIM provisioning application to perform resource provisioning using SCIM protocols.
  • SIEM Add-on: This role provides full access to all SIEM management functions in view-only mode.
  • AD Connector: This role allows the AD Connector application to perform AD Connector directory synchronization.

Working with roles

You can create and manage custom roles, as follows:

Create a custom role

  1. Click > Members > Roles. The Roles List page appears.

  2. Click . The Add Role page appears.

  3. Enter a Name for your custom role.

  4. Enter a Description for your custom role.

  5. Select the Managed Roles, as follows:

    • Select the All Roles to allow those assigned this role to manage all users.
    • Select the Selected Roles and from the Select Roles to Manage drop-down list, select the roles that you want the users assigned this role to manage. Repeat this procedure to add more roles.

      For example, if you want to create a custom role called Super Auditor that allows the role to manage all users assigned the Auditor role, select Auditor from the drop-down list. When you select a role, it appears in the Administrator is allowed to manage these roles list.

  6. Select the Managed Groups the role can manage, as follows:

    • Select All Groups to allow an administrator with this role to administer all groups.
    • Select Own Groups to allow the administrator to administer only the groups to which it belongs.
    • Select Selected Groups and from the drop-down list select the groups the administrator with this role can administer. Repeat this procedure to add more groups.
  7. Select the Permissions assigned to the role. Permissions are grouped by function.

    For example, if you create a custom role called Marketing and want to allow users with the Marketing role to access the Theme page, set Core Administration > Account Branding Customization to All.

  8. To confirm the role permissions, after assigning them to the role, toggle Show enabled only to see the list of permissions assigned to the role.

  9. Click Add to create the role.

Clone a role

You can create a copy of an existing role.

  1. Click > Members > Roles. The Roles List page appears.
  2. Click next to the role you want to clone.
  3. Click . The Add Role page appears.
  4. By default, Copy is appended to the name of the role you are cloning.
  5. Change the role Name, as required.
  6. Edit the role Description, as required.
  7. Choose one of the following options:
    • Select Manage All Roles to allow those assigned this role to manage all users.
    • Do not select Manage All Roles and from the Roles to Manage drop-down list, select the roles that you want users assigned this role to manage.

      For example, if you want to create a custom role called Super Auditor that allows the role to manage all users assigned the Auditor role, select Auditor from the drop-down list.

      note

      You can select more than one role to manage.

  8. Select the Managed Groups the role can manage, as follows:
    • Select All Groups to allow an administrator with this role to administer all groups.
    • Select Own Groups to allow the administrator to administer only the groups to which it belongs.
    • Select Selected Groups and from the drop-down list select the groups the administrator with this role can administer. Repeat this procedure to add more groups.
  9. Permissions define the tasks the role can manage. For example, if you create a custom role called Marketing and want to allow users with the Marketing role to access the Theme page, set Core Administration > Account Branding Customization to All.
  10. To confirm the role permissions after assigning them to the role, toggle Show enabled only to see the list of permissions assigned to the role.
  11. Click Add to create the role.

Edit a custom role

  1. Click > Members > Roles. The Roles List page appears.
  2. Click the name of the custom role you want to edit. The Edit Role page appears.
  3. Modify the settings as required.
  4. Click Save.

Delete a custom role

  1. Click > Members > Roles. The Role List page appears.
  2. Click next to the role you want to delete.
  3. Click Delete on the confirmation prompt.

Role permissions

Permissions define the tasks the role can perform in Identity as a Service. Permissions are organized into functional categories to help you assign appropriate access levels based on administrative responsibilities. The following sections provide details about permissions available in each category.

Core Administration

System entityDescription
Account and Authenticator SettingsControls the settings of the authenticators available in Identity as a Service; required to access the KBA WordMaps feature.
Account Branding CustomizationAllows administrators to customize the appearance of their Identity as a Service account and email templates.
Account Entitlement StatusAllows administrators to see the number of entitlements assigned to their account.
Account ReportsAllows administrators to monitor account activity and generate reports on specific metrics.
Archive ManagementAllows administrators to view and download archived audits.
Email Template ManagementAllows administrators to manage custom email templates.
Export ReportsAllows users to export user, grid card, and audit reports.
Roles ManagementControls the level of access each user has to Identity as a Service features.
Scheduled Task ManagementAllows administrators to schedule tasks such as report generation.
User Grid Card Content ManagementAllows administrators to print, export, and view grid cards.
User ManagementAllows administrators to manage users of their Identity as a Service accounts.
User Role ManagementAllows administrators to manage user roles.

User Authenticators

System entityDescription
ActiveSync Device ManagementAllows administrators to manage ActiveSync access.
Entrust Soft Token Manual Activation DetailsAllows administrators to view the activation code for an Entrust Soft Token authenticator.
Magic Link ManagementAllows administrators to manage Magic Links.
Magic Link Content ManagementAllows administrators to manage Magic Link content.
OTP ManagementAllows administrators to create and obtain OTP values for a user using an Admin API.
Pass-through Authenticator ManagementAllows administrators to manage pass-through authenticators.
Phone/Email OTP VerificationAllows administrators to manage phone and email OTPs.
User Desktop ManagementAllows administrators to view and remove Desktop entities in the user's Devices tab.
User Face Biometric ManagementAllows administrators to manage Face Biometric authenticators.
User Grid Card ManagementAllows administrators to assign, delete, view, edit, and enable or disable user grid cards.
User Knowledge-based Authenticator ManagementAllows administrators to manage KBA authenticators.
User Knowledge-based Authenticator View AnswersAllows administrators to view answers entered for a user's KBA from the administrator portal.
User Machine ID Authenticator ManagementAllows administrators to manage machine authenticators listed on a user's authenticator page.
User Passkey/FIDO2 Token ManagementAllows administrators to manage user passkey/FIDO2 authenticators.
User Password Authenticator ManagementAllows administrators to manage user passwords.
User Risk-based Authentication ManagementAllows administrators to manage user risk-based authenticator settings.
User Temporary Access Code ManagementAllows administrators to view or create a temporary access code for a user (code value requires View permission).
User Temporary Access Code View ValueAllows administrators to view a user's temporary access code value.
User Token Authenticator ManagementAllows administrators to control hardware and soft token authenticators assigned to other users.

Directories & Access

System entityDescription
Directories and Directory SyncControls which corporate directories synchronize with Identity as a Service.
Directory PasswordAllows administrators to read the directory account password for AD Connector directories through the API.
Enterprise Gateway and Agents ManagementControls gateways and gateway instances such as Directory Synchronization, RADIUS Proxy, Password, and Identity Guard agents.
Groups ManagementControls the groups available on an account.
Identity Provider ManagementAllows administrators to configure and manage identity providers.
OrganizationsAllows administrators to manage organizations and domain-based identity providers for OIDC applications.
User Attribute ManagementAllows administrators to manage the information fields available in user profiles.
Verify UserAllows administrators to manage user verification.

Application & Service Providers

System entityDescription
Application Template ManagementAllows access to configuration settings needed to add an application to Identity as a Service.
Applications ManagementAllows administrators to configure applications so they are accessible after authenticating to Identity as a Service.
Outbound Provisioning ManagementAllows administrators to create and manage provisioners for third-party user provisioning.
Resource Rules ManagementAllows administrators to define resource rules for application access restrictions.

Access Management and APIs

System entityDescription
Access Management Roles ManagementAllows administrators to manage Role-Based Access Control (RBAC) for protected OAuth resources.
APIs/URLs ManagementAllows administrators to manage OAuth resource server APIs.
Scopes ManagementAllows administrators to manage OAuth API/URL scopes.
User OAuth Token ManagementAllows administrators to view and revoke OAuth tokens.
User Smart Credential SignatureAllows users to access APIs that support smart credential push signature.
Webhooks ManagementAllows administrators to manage webhooks.

Certificates & Security

System entityDescription
Certificate Authority ManagementAllows administrators to access certificate authorities configured on an Identity as a Service account.
Digital ID Management for Smart CredentialsAllows administrators to access each digital ID configuration within a configured CA.
Domain Controller CertificatesAllows administrators to configure domain controllers.
Smart Credential Definition ManagementAllows administrators to access smart credential definitions configured in an account.
User Smart Credential Authenticator ManagementAllows administrators to access Mobile Smart Credentials assigned to each user.

Issuance and Credentials

System entityDescription
Verifiable Credential Definition ManagementAllows administrators to manage verifiable credential definitions.
Verifiable Credential ManagementAllows administrators to manage verifiable credentials.
Verifiable Presentation Definition ManagementAllows administrators to manage verifiable credential presentation definitions.

Bulk Operations

System entityDescription
Bulk Group OperationsAllows administrators to import many groups by using CSV files.
Bulk Hardware Token OperationsAllows administrators to bulk import token data files and assign hardware tokens.
Bulk IdentityGuard OperationsAllows administrators to bulk import Entrust IdentityGuard authenticators (KBA, Entrust Soft Tokens, Hardware Tokens).
Bulk User OperationsAllows administrators to import many users by using CSV files.