Work with user groups in Remediate
Puppet Remediate provides a limited number of roles that allow you to control what users can and can’t do.
The following permission groups are available to add to accounts:
Permission Group | Description |
---|---|
accept-risk | Accept risk for a given vulnerability on selected nodes. |
add-credential | Add access credentials for a node. |
add-source | Add a vulnerability scanner or infrastructure source. |
add-task | Add a new remediation task. |
admin | Complete first-run configuration. Members of this group also have all the permissions of the admin superuser role except the ability to login into the user administration UI and manage users. |
remove-credential | Remove access credentials for a node. |
remove-source | Remove a vulnerability scanner or infrastructure source. |
remove-task | Remove a new remediation task. |
run-task | Run a remediation task. |
When using LDAP, you may want to grant a certain user group full permissions but restrict other user groups to more limited permissions.
This following example describes a sample scenario. It shows how to grant everyone in the LDAP group called secops full permissions, while letting all other users just run tasks.
To achieve this, we'll configure 2 LDAP providers with default mappers, and assign a different priority to each provider.
Related information