Documentation
LiveNXOperations Dashboard Admin GuideDownload PDF
Settings : User Management
User Management
User Management is where users are added to the system, authorization groups are managed, user sessions can be reviewed, and external authentication integration can be configured.
User accounts can be authenticated locally or LiveNX can integrate with external user repositories for user authentication. Today, LiveNX supports the following external authentication methods:
LDAP
RADIUS
TACACS+
SSO
Please review this chapter for configuring LiveNX to these external repositories.
All user account authorization is done in LiveNX via Groups.
The User Management tab is where users are added to the system and managed.
To add a new user, click Add.
The Add New User modal appears.
Select the Authentication Type and click Next Step.
Define the user:
Username
Display Name
Group
Session Timeout
Choose a password
Repeat Password
When finished, click Add User.
The new user will now be listed on the User Management tab.
To edit the user, select the user and click Edit.
All user account authorization is done in LiveNX via Groups. The Group Management tab is where Groups are added and managed.
Authentication Groups have four components:
Role – Defines the authorized capabilities of the group members, i.e., monitor only vs. config changes
Device Authorization – defines which devices are visible for monitoring by group members
Page Access – defines which pages are available in the Operations Dashboard (WebUI) for group members
Users – which LiveNX users are a member of the group
Role
The group’s Role defines the authorized capabilities for the members of the group.
There are three Roles available: Admin, Config, and View. There capabilities will be summarized in the table below:
New Role
Description
Device Access
Capabilities
Admin
Can perform any action for all resources. Is capable of making changes to the system that impact other users
All devices
All capabilities
Config
Can perform any action for its selected resources. Is capable of making changes to the system that impact other users but at more limited level than admin. An example is that a “config” user will not be able to access “Settings”
Only devices for which a user has been given permission to access
(All Devices by Default)
• In the Operations Dashboard: Config can optionally manage Devices, Custom Applications, Filters, Site
 
• In the Engineering Console: Config can optionally control CLI GUIs (ie. Manage QoS, IP SLA, ACLs, PBR, etc.)
View
Can primarily only monitor data for its selected resources. Is unable to make changes that impact other users.
Only devices for which a user has been given permission to access
(All Devices by Default)
Monitor Only
Device Authorization
Device Authorization defines which device’s SNMP and NetFlow metrics are visible by group members.
By default, all devices are available for all roles. Restricting visibility to selected devices can be accomplished by filtering devices, sites, or regions.
Page Access
Operations Dashboard (WebUI) page access can be limited per role
Most pages are accessible by all Roles.
Some pages are accessible to only Admins.
Some pages are accessible to Admins and Config.
The table below shows the pages only available to Admin and Config roles:
Section
Page
Required Page Access
Required Role
Configure
Alert Managment
config/admin
Configure
Application Management
Application Management
config/admin
Configure
OID Polling
OID Polling
config/admin
Configure
Device Management
Device Management
config/admin
Configure
Filter Management
Filter Management
config/admin
Configure
Site Management
Site Management
config/admin
Gear Icon
Settings
admin
Gear Icon
User Management
admin
Gear Icon
LiveNX Server
admin
Users
Defines which LiveNX users are a member of the group.