From the course: Configuration Manager: Configure and Maintain a Management Infrastructure

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Configure role-based administration

Configure role-based administration

From the course: Configuration Manager: Configure and Maintain a Management Infrastructure

Start my 1-month free trial

Configure role-based administration

- [Instructor] With System Center Configuration Manager, you use role-based administration to secure the access that is needed to administer Configuration Manager. You also secure access to the objects that you manage, like collections, deployments, and sites. Let's take a look at role-based administration. Using security roles to grant security permissions to administrative users, security roles are groups of security permissions that you assign to administrative users so that they can perform their administrative tasks. These security permissions define the administrative actions that an administrative user can perform and the permissions that are granted to particular object types. As a security best practice, assign the security roles that provide the least permissions. Configuration Manager has several built-in security roles to support typical groupings of administrative tasks, such as Full Administrator, Asset Manager, and Software Update Manager. Collections specify the user…

Contents