ESET Online Help

Search
Select the category
Select the topic

Roles

The Roles panel allows creation and modification of a role based permission system, to fine tune access to ESET Endpoint Encryption (EEE) Server features.

To assist in granting the correct level of access to users, there are a number of standard built-in roles available which cannot be modified. New Roles can be created with specific access rights by system administrators. There are 3 standard user roles available (System Administrator, Administrator and Helpdesk) which are described below. Also, a System Administrator can generate new roles (based on any existing roles) and assign these to users which provides flexibility to the system.

Standard Built-in Roles

System Administrator

The system administrator has full access to all features and functions of the EEE Server. They can generate new organisations, add new users and configure the appearance of the displayed information. Through the settings control they can change internet access, security requirements and SMTP server settings. They can add, modify and delete any operational function (encryption keys, groups, teams, users, workstations, etc.), and add new roles for user access. In effect, they are administrators for the entire system and have full access to the entire system.

Administrator

An administrator can do all that a System administrator can, with the exception of various system based tasks (they cannot add organisations, create EEE Server logins, add new ES roles, or copy encryption keys to another organisation). In effect, they are administrators for the specifically defined organisations, but cannot modify system settings.

Helpdesk

A Helpdesk user has limited access to EEE Server functions, they can change their own password and can view, but not change other details concerned with the daily operation of the system.

Creating new Roles

To create a new Custom Role, select Administration from the control panel, click Roles, click New and in the New Custom Role window, type the Role Name and from the drop-down menu, select an existing role the new custom role will be based on.

Amending the Role Permissions

Once generated, you can add and remove the permissions as required. Select the role in the Custom Role window (centre panel at the bottom, below), this will then display the permissions associated with that role. To add (or remove) permissions, click the Add Permissions or Remove Permissions buttons. In the sub window select those functions to be added (or removed)