You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/administration/role-based-access-control/index.mdx
+15-22Lines changed: 15 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -155,24 +155,25 @@ As with Object Categories, it's not necessary to assign a subnet category to eve
155
155
156
156
## Assigning Object Permissions to Admin Groups
157
157
158
-
Object permissions apply to the following objects:
158
+
You can assign admin groups to objects from the list view of the object type or the edit page of a specific object. You can also assign admin groups to discovered objects.
159
+
160
+
The **Add Groups** and **Delete Groups** actions are available for the following objects:
161
+
159
162
- Buildings
160
163
- Rooms
161
164
- Racks
162
-
- Devices
163
-
- Assets
164
-
- Object Categories
165
-
- PDUs
166
-
- VRF Groups
167
-
- Subnet Categories
168
-
- Purchases
169
-
- Vendors
170
165
- Customers
171
-
- Auto Discovery jobs
172
-
173
-
You can assign admin groups to objects from the list view of the object type or the edit page of a specific object. You can also assign admin groups to discovered objects.
174
-
175
-
From the list view of the object type, you can bulk select the objects you want to assign permissions to. From the **Actions** dropdown, select the **Assign Permissions** action.
166
+
- Discovery job objects:
167
+
- AD/LDAP Sync
168
+
- Certificate Autodiscovery
169
+
- Cloud Autodiscovery
170
+
- Hypervisors/*nix/win for Autodiscovery
171
+
- IPMI/Redfish Autodiscovery
172
+
- Ping Sweep
173
+
- SNMP Autodiscovery
174
+
- UCS/ACI/Load Balancers for Autodiscovery
175
+
176
+
From the list view of the object type, bulk select the objects you want to assign permissions to. From the **Actions** dropdown, select the **Add Groups** action.
176
177
177
178
<ThemedImage
178
179
alt="Add Groups action"
@@ -196,14 +197,6 @@ Remove previously assigned permissions with the **Delete Groups** action. If you
196
197
197
198
You can also assign permissions from object edit pages, as shown above.
198
199
199
-
The **Add Groups** and **Delete Groups** actions are available for the following objects:
200
-
- Buildings
201
-
- Rooms
202
-
- Racks
203
-
- VRF Groups
204
-
205
-
Similarly, the device, asset, and PDU list pages have **Set Object Category** and **Delete Object Category** actions. The Subnet list page has **Set Subnet Category** and **Delete Subnet Category** actions.
206
-
207
200
## Who Can Assign Admin Groups to Objects?
208
201
209
202
Superusers are allowed to add, change, and delete groups for objects through the UI, import spreadsheets, or the API. Superusers can also enable non-superusers to have this ability by assigning them add, change, and delete capabilities for "Object Permissions".
Copy file name to clipboardExpand all lines: docs/auto-discovery/index.mdx
-9Lines changed: 0 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -230,15 +230,6 @@ The Device42 remote collector (RC) is a lightweight virtual appliance (a VM) tha
230
230
231
231
For more information head to the dedicated [Remote Collector page](auto-discovery/remote-collector-rc.mdx).
232
232
233
-
## Scripts for Linux, Solaris, Windows, and Mac
234
-
235
-
There is a selection of open-source scripts on the Device42 GitHub page:
236
-
237
-
- For Mac, Linux, and Solaris autodiscovery, see the [`nix_bsd_mac_inventory`](https://github.com/device42/nix_bsd_mac_inventory) repository.
238
-
- Windows discovery scripts can be found on the [Device42 GitHub repository](https://github.com/device42).
239
-
240
-
Windows scripts use PowerShell 2.0/iPython to get individual Windows host details and to get Windows machines. Details are relayed to the Device42 Main Appliance via the API. The Linux, Solaris, and Mac scripts connect to remote servers using SSH to gather inventory data, sending that data back via the Device42 RESTful API.
241
-
242
233
## Using REST APIs
243
234
244
235
You can automate inventory management and integrate with your own scripts or other programs using the Device42 RESTful APIs as shown in the [Create Hardware Models](how-to-videos/api-imports-add-create-hardware-models.mdx) video.
0 commit comments