Skip to content

Commit 8fd42b6

Browse files
authored
Merge pull request #483 from ritza-co/19.07.11
Docs 19.07.11 release (Week 47, 2025)
2 parents 4cbb8f3 + fb0a8d9 commit 8fd42b6

File tree

3 files changed

+16
-31
lines changed

3 files changed

+16
-31
lines changed

docs/administration/role-based-access-control/index.mdx

Lines changed: 15 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -155,24 +155,25 @@ As with Object Categories, it's not necessary to assign a subnet category to eve
155155

156156
## Assigning Object Permissions to Admin Groups
157157

158-
Object permissions apply to the following objects:
158+
You can assign admin groups to objects from the list view of the object type or the edit page of a specific object. You can also assign admin groups to discovered objects.
159+
160+
The **Add Groups** and **Delete Groups** actions are available for the following objects:
161+
159162
- Buildings
160163
- Rooms
161164
- Racks
162-
- Devices
163-
- Assets
164-
- Object Categories
165-
- PDUs
166-
- VRF Groups
167-
- Subnet Categories
168-
- Purchases
169-
- Vendors
170165
- Customers
171-
- Auto Discovery jobs
172-
173-
You can assign admin groups to objects from the list view of the object type or the edit page of a specific object. You can also assign admin groups to discovered objects.
174-
175-
From the list view of the object type, you can bulk select the objects you want to assign permissions to. From the **Actions** dropdown, select the **Assign Permissions** action.
166+
- Discovery job objects:
167+
- AD/LDAP Sync
168+
- Certificate Autodiscovery
169+
- Cloud Autodiscovery
170+
- Hypervisors/*nix/win for Autodiscovery
171+
- IPMI/Redfish Autodiscovery
172+
- Ping Sweep
173+
- SNMP Autodiscovery
174+
- UCS/ACI/Load Balancers for Autodiscovery
175+
176+
From the list view of the object type, bulk select the objects you want to assign permissions to. From the **Actions** dropdown, select the **Add Groups** action.
176177

177178
<ThemedImage
178179
alt="Add Groups action"
@@ -196,14 +197,6 @@ Remove previously assigned permissions with the **Delete Groups** action. If you
196197

197198
You can also assign permissions from object edit pages, as shown above.
198199

199-
The **Add Groups** and **Delete Groups** actions are available for the following objects:
200-
- Buildings
201-
- Rooms
202-
- Racks
203-
- VRF Groups
204-
205-
Similarly, the device, asset, and PDU list pages have **Set Object Category** and **Delete Object Category** actions. The Subnet list page has **Set Subnet Category** and **Delete Subnet Category** actions.
206-
207200
## Who Can Assign Admin Groups to Objects?
208201

209202
Superusers are allowed to add, change, and delete groups for objects through the UI, import spreadsheets, or the API. Superusers can also enable non-superusers to have this ability by assigning them add, change, and delete capabilities for "Object Permissions".

docs/auto-discovery/index.mdx

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -230,15 +230,6 @@ The Device42 remote collector (RC) is a lightweight virtual appliance (a VM) tha
230230

231231
For more information head to the dedicated [Remote Collector page](auto-discovery/remote-collector-rc.mdx).
232232

233-
## Scripts for Linux, Solaris, Windows, and Mac
234-
235-
There is a selection of open-source scripts on the Device42 GitHub page:
236-
237-
- For Mac, Linux, and Solaris autodiscovery, see the [`nix_bsd_mac_inventory`](https://github.com/device42/nix_bsd_mac_inventory) repository.
238-
- Windows discovery scripts can be found on the [Device42 GitHub repository](https://github.com/device42).
239-
240-
Windows scripts use PowerShell 2.0/iPython to get individual Windows host details and to get Windows machines. Details are relayed to the Device42 Main Appliance via the API. The Linux, Solaris, and Mac scripts connect to remote servers using SSH to gather inventory data, sending that data back via the Device42 RESTful API.
241-
242233
## Using REST APIs
243234

244235
You can automate inventory management and integrate with your own scripts or other programs using the Device42 RESTful APIs as shown in the [Create Hardware Models](how-to-videos/api-imports-add-create-hardware-models.mdx) video.

docs/getstarted/installation/discovery-port-configurations.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ Below is a complete reference list of all ports that may be used to access targe
88
| Source | Default Port | Protocol | Directionality | Reason |
99
|-------------------------------|--------------------|-----------|----------------|---------------------------------------------|
1010
| Main Appliance (MA) | 389 (TCP/UDP)<br/>636 (TCP/UDP) | LDAP<br/>LDAPS | MA to targets | Active Directory Sync |
11+
| Main Appliance (MA) | 123 (UDP) | NTP | MA to targets | Time synchronization |
1112
| Remote Collector(s) (RC) | 53 (TCP) | DNS | Device42 to targets | DNS Zone Discovery |
1213
| Remote Collector(s) (RC) | 623 (UDP) | IPMI | RC to targets | IPMI based discovery of management interfaces |
1314
| Remote Collector(s) (RC) | 22 (TCP) | SSH | RC to targets | SSH based discovery of Linux and Unix systems |

0 commit comments

Comments
 (0)