Access control (Legacy, pre-10.1)
The Micetro access model is object-based. This is similar to mainstream operating system access models such as the Windows Security model, where you choose an object and set access restrictions for particular Users, Groups or Roles for the chosen object. We define a set of object types, and a set of Access Flags for each object type. These flags can then be set to Allow or Deny for each User, Group or Role.
The relationship between Groups, Users and Roles is as follows:
Groups can contain Users
Groups cannot contain Groups
Users can be a member of any number of Groups
Users and Groups can be assigned to Roles.
Built-in Roles
Note
Please note that in previous versions (< 6.7) roles did not exist and the built-in roles described below were previously built-in groups. All of the users that were members in specific built-in groups are now assigned to the corresponding built-in roles.
Five Roles are built-in to Micetro. These roles are special in that they get full access for their respective domains for all Access Flags.
When new objects are created, the Built-in Role that presides over that object, as well as the user or group that created the object, receives full access to it.
Each administrator role also receives default access to its corresponding module (including an Access Flag set on Micetro object allowing them administrator privileges for their domain). The Administrators role receives default access to all the Access Flags on Micetro object. Default access for each Built-in role is as follows:
Administrators. Full access to all objects
DNS Administrators. Full access to DNS objects, including zones, DNS servers, etc.
DHCP Administrators. Full access to DHCP objects, including scopes, DHCP servers, etc.
IPAM Administrators. Full access to IPAM objects, including IPAM ranges, etc.
User Administrators. Full access to User and Group objects.
It is recommended that our clients use these Roles. These roles are the only roles that can receive default access to new items. User-defined Roles do not receive any access information for new objects and are considered to have “denied” access. To allow a User or a Group to receive default full access to a new object, include the User or Group as a member in the corresponding Built-in Role. If you need to reduce this particular User’s access, refer to access-overrde section below.
When it’s mentioned that a User or Group has Full access to an object we mean that the User or Group has all known Access Flags for the object set to Allow.
The Administrator User
A single user is Built-in to Micetro. The Administrator User exists completely outside of the access model. This User can do everything, and it is not possible to deny any action to this User.
Examples:
The Micetro object will have the following access bits set to Allow for the DNS Administrators Role:
Access Flags |
Allow |
Deny |
---|---|---|
Administer DNS servers |
1 |
0 |
Access DNS Module |
1 |
0 |
For every DNS server created, the server will have the following flags set to Allow for the DNS Administrators Role:
Access Flags |
Allow |
Deny |
---|---|---|
Edit DNS Server access |
1 |
0 |
List (or view) DNS Server |
1 |
0 |
Edit DNS Server options |
1 |
0 |
Add Master Zones |
1 |
0 |
Add non-Master Zones |
1 |
0 |
View DNS Server Log |
1 |
0 |
Clear DNS Server Log |
1 |
0 |
Edit DNS server properties |
1 |
0 |
For every DNS Zone created, the zone will have these flags set to Allow for the DNS Administrators Role:
Access Flags |
Allow |
Deny |
---|---|---|
Edit Zone access |
1 |
0 |
List (or view) Zone |
1 |
0 |
Enable/disable Zone |
1 |
0 |
Edit Zone options |
1 |
0 |
Delete Zone |
1 |
0 |
Enable/disable apex records |
1 |
0 |
Edit apex records |
1 |
0 |
Enable/disable wildcard records |
1 |
0 |
Edit wildcard records |
1 |
0 |
Enable/disable other records |
1 |
0 |
Edit other records |
1 |
0 |
Edit zone properties |
1 |
0 |
Overriding Access Settings
The Deny setting for an Access Flag allows you to override access settings inherited from Roles. A User’s Access Footprint is calculated from the aggregate access settings of all Roles in which he is a member. In this calculation, the Deny flag overrides the Allow flag. This means that if a User is in several Roles where a specific Access Flag is set to Allow, and only a single Role where the same Access Flag is set to Deny, the result of the calculation for that Access Flag is Deny.
Let us take an example. Assume you want to add a new user that has DNS Administrator privileges to all servers and zones, but on a particular zone, this user should not be able to view or clear the history, nor should he be able to edit custom properties. To accomplish this, you would first include the new user in the Built-in Role named DNS Administrators.
To restrict the user for a particular zone you would locate the zone and set access for your new user to the following:
Access Flags |
Allow |
Deny |
---|---|---|
Edit Zone access |
1 |
0 |
List (or view) Zone |
1 |
0 |
Enable/disable Zone |
1 |
0 |
Edit Zone options |
1 |
0 |
Delete Zone |
1 |
0 |
Enable/disable apex records |
1 |
0 |
Edit apex records |
1 |
0 |
Enable/disable wildcard records |
1 |
0 |
Edit wildcard records |
1 |
0 |
Enable/disable other records |
1 |
0 |
Edit other records |
1 |
0 |
Edit zone properties |
0 |
1 |
If you wanted to give similar access to other users, you could instead create a new Role, add the Users to the Role, and apply the aforementioned access to the zone in question for the new Role.
This system allows for a great deal of flexibility when designing your security. Any Role can be extended or overridden for a set of Users by simply adding the Users to another Role with a different access setup, or by directly overriding certain Access Flags on the Users themselves.
If no access is defined for a User or Role on a particular object, the access model assumes that all the Flags are set to Deny.
New Objects
When a User creates a new object in Micetro, the object is afforded a certain default access based on the initial access settings for the object type. To define initial access settings for different object types, do the following:
From the menu bar, select
.Select the object type for which you want to set the initial access. The Access Control dialog box displays.
Set the desired access for new objects and click OK.
Edit Access Flag
Each object type has an Access Flag named Edit Access. This flag is special in that it directs a User, Group’s or Role’s access to the object’s access information. In other words, if a User has this flag set on an object, he may edit the Access Flags for the object. This means that the User could remove a different User or Group from the object completely. He could even remove the User that created the object. In light of this, the Edit Access flag should be treated with care.
Access for Built-in groups is impossible to change. However, it would be possible to shut out all Users in Micetro from a certain object by simply editing access for each User directly. You could even shut yourself out. The Administrator User will always have full access to every object, so if such situations arise, the Administrator User should be used to set things straight.
Access Flags Defined
Each object type in Micetro has a set of Access Flags defined.
Global Access
This is an object referring to Micetro as a whole. It contains flags that define access to the different clients and modules available in Micetro, as well as Administration tasks.
Object |
Description |
---|---|
Administer users/groups |
Access to create, edit, and delete users and groups |
Administer IP Address Ranges |
Access to admin IPAM ranges |
Administer DNS servers |
Access to create, edit, and delete DNS servers |
Administer DHCP servers |
Access to create, edit, and delete DHCP servers |
Access IPAM Module |
Access to the IPAM Module |
Access DNS Module |
Access to the DNS Module |
Access DHCP Module |
Access to the DHCP Module |
Access Management Console |
Access to the Management Console |
Access CLI |
Access to the CLI |
Access to Web Interface |
Access to the Men&Mice Web Interface |
Access to basic zone view in Web Interface |
Access to the basic zone view in the Men&Mice Web Interface |
Access to advanced zone view in Web Interface |
Access to the advanced zone view in the Men&Mice Web Interface |
Access to IPAM view in Web Interface |
Access to the IPAM view in the Men&Mice Web Interface |
Access to report view in Web interface |
Access to the report view in the Men&Mice Web Interface |
Access to task list view in Web interface |
Access to the task list view in the Men&Mice Web Interface |
Access to view history |
Access to history window in the Management Console. Also provides access to the history for all objects. |
Access to Host editor |
Access to the host editor view in the Men&Mice Web interface |
Access to manage AD Sites and Site Links |
Access to work with AD Sites and Site Links. |
Access to manage clouds |
Access to add/remove cloud providers into Men&Mice |
Access Workflow module |
If customer has workflow license, grants user access to submit DNS record requests, and approvers to view and approve submitted requests |
Access to advanced reporting |
If customer has reporting license, grants access to advanced reporting features |
Access to ‘Import Data’ web task |
Access the Import Data task in Web Interface as well as to Import data into the newer Men&Mice Web Application |
DNS Zone
Object |
Description |
---|---|
Edit Zone access |
Access to edit an object’s access |
List (or view) Zone |
Access to list (view) a zone |
View zone history |
Access to viewing the history for the zone |
Enable/disable Zone |
Access to enable/disable the zone |
Edit Zone options |
Access to edit zone options |
Delete Zone |
Access to delete zone |
Enable/disable apex records |
Access to enable/disable zone’s APEX records |
Edit apex records |
Access to edit zone’s APEX records |
Enable/disable wildcard records |
Access to enable/disable zone’s wildcard records |
Edit wildcard records |
Access to edit zone’s wildcard records |
Enable/disable other records |
Access to enable/disable zone records other than APEX |
Edit other records |
Access to edit zone records other than APEX records |
Edit zone properties |
Access to edit properties for the zone |
DHCP Scopes and IP Address Ranges
Object |
Description |
---|---|
Edit range Access |
Access to edit an object’s access |
List (or view) a range |
Access to list (view) a range/scope |
View range history |
Access to viewing the history for the range/scope |
Delete range |
Access to delete a range/scope |
Edit range properties |
Access to edit range/scope properties |
Edit IP Address properties |
Access to edit the properties for an IP Address in the range/scope |
Use IP Address in DNS |
Access to create a DNS entry for the selected IP Address |
Create a subrange |
Access to create a new subrange of the range/scope |
Create multiple hosts per IP Address |
Access to create multiple address records with the same IP Address |
Ping IP Address |
Access to perform a ping request for hosts in the range/scope |
Edit AD site association |
Allows editing of associations for AD sites |
Enable/disable scope |
Access to enable/disable scope |
Read scope options |
Access to read scope options |
Read/write Scope options |
Access to read and write scope options |
Edit Reservations |
Access to edit reservations” |
Edit address pools |
Access to edit address pools |
Edit exclusions |
Access to edit exclusions |
Release Leases |
Access to release leases |
Add a group |
Access to add a DHCP group (ISC DHCP only) |
DNS Server
Object |
Description |
---|---|
Edit DNS Server access |
Access to edit an object’s access |
List (or view) DNS Server |
Access to list (or view) server |
View DNS server history |
Access to viewing the history for the DNS server |
Edit DNS Server options |
Access to server options |
Add Master Zones |
Access to add a master zone |
Add non-Master Zones |
Access to add a non-master zone |
View DNS Server Log |
Access to view the server log |
Clear DNS Server Log |
Access to clear the server log |
Edit DNS server properties |
Access to edit properties for the DNS Server |
DHCP Server
Object |
Description |
---|---|
Edit DHCP Server Access |
Access to edit an object’s access |
List (or view) DHCP Server |
Access to list (or view) server |
View DHCP server history |
Access to viewing the history for the DHCP server |
Read DHCP Server options |
Access to view server options |
Read/write DHCP Server options |
Access to read and write server options |
Add a scope |
Access to add a DHCP scope |
Edit DHCP server properties |
Access to edit properties for the DHCP Server |
Edit reservations |
Access to edit reservations in DHCP scopes |
Add a group |
Access to add DHCP groups (ISC DHCP only) |
Read DHCP class data |
Access to view DHCP class data on an (ISC DHCP only) |
Read/write DHCP class data |
Access to read and write DHCP class data (ISC DHCP only) |
DHCP Groups
Object |
Description |
---|---|
Edit DHCP group |
Access to edit an object’s access |
List (or view) DHCP group |
Access to list (or view) DHCP group |
View DHCP group history |
Access to viewing the history for the DHCP group |
Edit Reservations |
Access to edit reservations |
Read DHCP group options |
Access to view group options |
Read/write DHCP group options |
Access to read and write group options |
Delete DHCP group |
Access to delete a DHCP group |
Address Spaces
Object |
Description |
---|---|
Edit address space access |
Access to edit an object’s access |
List (or view) address space |
Access to list (or view) address space |
View address space history |
Access to viewing the history for the address space |
Access Control Dialog Box
Through the Access Control module, you select groups/users for which you want to manage permissions.
The Access Control dialog box is used to define access to individual objects in the system. To define access for an object, right-click the object and choose Access from the popup menu.
To define access for individual components of Micetro, select
. The Access Control for Micetro dialog box displays. The default groups/user names are shown. The permissions for any selected group/user are also shown.Edit access controls
While viewing the Access Control dialog box, click the Add button. The Select user, group or role dialog box displays.
Highlight the user, group and/or role for which you want to assign permissions.
Click the Select button.
When you return to the main dialog box, the user/group is highlighted in the list of users and groups.
To specify the permissions for this selected group/user/role, do the following:
Move to the Permission for [group/user/role selected] list.
Click in the checkbox for each permission you want to Allow or Deny.
Note
It is not necessary to select Deny unless you want to ensure that a user/group/role does not have permission to a specific object. However, if you do not specify the permission for an individual user, but the group(s) or role(s) to which the user belong does Allow access to that object, the user (by default) also has access.
When all selections are made, click OK. The dialog box closes.
Repeat the above for any additional groups/users.
Initial Access For
Through this function, you specify access privileges that should be set for objects when they are created. This function is identical to the Access Model and Permissions function except that a new user type – “Creator” (Meta user) - is used to specify the access privileges that should be set for the object creator.
Note
The access control dialog box for IP Address Ranges and Scopes contains a checkbox, ‘IP Address Ranges/Scopes inherit access by default’. If this checkbox is checked, a new range or scope will inherit all access bits from its parent. For more information on inherited access, refer to IP Address Management—Range Access.
From the menu bar, select Global Access for details on working with this dialog box.
, and then the object type for which you want to set the initial access. The Access Control dialog box displays. Refer to