2.6.1 How does the administrative access work?
To manage a PrivateServer installation you have to use primarily the web interface. The web interface authenticates the users manages authorizations so you can profile each user for a single management goal. Before starting we should clarify some basic concepts. The management console access is based on three pillars:
- Request Maps
184.108.40.206 What is a User?
A User is holding a single account that can be logged in with a pair of username and password. Once logged in, the user can perform a management task based on his/hers roles.
From the present version each user has only one contemporary access to the web console. If a new login is performed from a different browser/host using the same credentials of an already logged user, then the one logged in is automatically logged out and replaced by the last arrived in a First In First Out way.
220.127.116.11 What is a Role?
A Role defines the actions to be authorized on. Users can be granted one or more roles, depending on their duties in managing PrivateServer.
Two kinds of roles are defined:
- ROLE_XXX: defines a coarse-grained role, granting authorizations to sets of features
- ROLE__RIGHT_YYY: defines fine-grained role, typically authorizing to single feature
18.104.22.168 What is a "Request Map"?
The Request Maps are matrices that join a role with an allowed action. Any action is in URI form (as all the Web management console is actually web based).
Assigning request maps to roles, preconfigured or new ones, let you change behavior of application in unexpected way at runtime, without changes to sources or waiting for a new release. The downside is that deep knowledge of PrivateServer internals is required, so consult with us for help or debug yourself the URL accessed from browser.
2.6.2 Managing Roles
You can access to the Roles management interface using the Role entry in the menu on the left.
Specific Role required!
You need ROLE_SUPERADMIN role to obtain access to the Role entry
After you selected it you will be redirected to the Role List page.
By default you have the following roles:
- ROLE_ADMIN: grants rights to every management features of PrivateServer
- ROLE_SUPERADMIN: grants rights to very technical features and access to internal, generally not required to normal usage, even by administrator
- ROLE_TEST: management of ranges of TEST accounts, required for stress test suite to assess capability of your infrastructure
- ROLE_USER: grants rights to manage voip users and groups
- ROLE__RIGHT_ACCESSCONTROL: management of roles
- ROLE__RIGHT_AUDITLOG: access to auditing logs
- ROLE__RIGHT_AUTHENTICATION: access to web session logs
- ROLE__RIGHT_BACKUP: management of backup and restore
- ROLE__RIGHT_CERTIFICATE: management of digital certificates
- ROLE__RIGHT_CONFERENCE: management of conference rooms
- ROLE__RIGHT_CONFERENCE_RO: read-only access to conference rooms info
- ROLE__RIGHT_CDR: access to Call Detail Record logs
- ROLE__RIGHT_GROUP: management of groups
- ROLE__RIGHT_GROUP_RO: read-only access to group info
- ROLE__RIGHT_NETWORK: management of network-related configuration, such as net interfaces, NAT, RTP
ROLE__RIGHT_PROVISIONING: INTERNAL USE ONLY
- ROLE__RIGHT_REQUESTMAP: management of request maps
- ROLE__RIGHT_REST: provides access to web services REST requests
- ROLE__RIGHT_SIPSESSION: access to SIP sessions logs
- ROLE__RIGHT_SECURITY_INFO: access to internals info of access control framework
- ROLE__RIGHT_TELEPHONY: configuration of SIP trunks and dialing rules
- ROLE__RIGHT_USER: management of web console's users and assignment of roles
- ROLE__RIGHT_VOIPACCOUNT: management of VoIP accounts
- ROLE__RIGHT_VOIPACCOUNT_RO: read-only access to VoIP accounts info
When you create users, you can assign multiple roles to grant him/her proper right to features, depending on their duties in managing a PrivateServer installation
To create a new role just click on the "New Role" button on the top of the list. You will be taken to the "Create Role" form page (see figure 1. Create Role form). Insert "ROLE_LOG" in the Authority field and click Create (a description is optional).
Now click on the "Delete" button below the form. The warning pop up windows asks your confirmation. Press the Ok button to delete the Role.
2.6.3 Managing users
Clicking the "User" entry in the left menu under the "Access Control" section will take you to a page like the one shown in figure 2. Web Console User interface. This table shows you all users. By default you should see at least the admin one. To create a new User just click on the New User button.
You will be taken to the "Create User" form as shown in figure 3. Create User form. Fill in the fields Username, Password and Confirm Password with your chosen user name. You also need to select a proper Role to be assigned. Check the chosen Role and click on the Create button.
If you do not select a strong password then you get a blocking warning complaining about a weak password.
Change the password to a stronger one (a good example is "Pr1v4t3_yes!" without quotes). If the process gone fine, you can see an info message on the top of the user detail form (see figure 5. Edit User form).
The new user is listed in the "User List" table.
From the User List table select the test user to get back to the Edit User form. Change the user name from test to testone and press the Update button at the bottom of the form. The form is reloaded with the updated field and a label appears informing that you've performed an update action. Also in the User List table shows the new user name.
Click again on the user entry (testone) from the list to get back to the Edit User form. This time click on the Delete button. A confirmation pop up window will be shown. Select Ok to be taken back again to the User list: the deleted user is not present any more.