Chapter 8: policies, Controlling access using policies, Policy summary – Raritan Computer CC-SG User Manual

Page 103: Figure 87 policy summary

Advertising
background image

C

HAPTER

8:

P

OLICIES

89

Chapter 8: Policies

Controlling Access Using Policies

Configuring new policies to provide user access to nodes is optional, but central to making
effective use of CC-SG ability to control that access. If you want to give all users access to all
nodes, simply assign the Full Access Policy to all user groups.

If you want to have more control over user access to nodes you will need to create policies to
define rules for that access. Like all privileges, policies are assigned to User Groups in order to
apply those access rules to the users in the group.

If you completed Guided Setup (refer Chapter 3: Configuring CC-SG with Guided Setup), a
number of basic policies may already have been created. Now, you may want to apply these
policies to existing user groups. If you have not used Guided Setup or created the desired
policies you will want to follow the directions below. You will:
• Create Node Groups to organize the nodes you want to create access rules for.
• Create Device Groups if you want to create access rules for Raritan devices providing

interfaces to nodes.

• Create a policy for a node (or device) specifying when access to that node can occur.
• Apply this policy to a user group.

Policy Summary

The following diagram is a visual representation of how to implement security with CC-SG:

Figure 87 Policy Summary

Advertising