Security Role Operations
Adding or Modifying Claims to the Administrator Role
Editing the built-in Administrator role is different than editing any other role. Instead of the full security dialog opening, only the claims tab will open when you click Edit from the Security Roles and Claims page.
To add a new claim to the built-in Administrator security role or update an existing claim:
- In the Management Portal, browse to System Settings Icon
> Security Roles and Claims.
-
On the Security Roles and Claims page > Security Role tab, highlight the Administrator row and click Edit from the top of the grid or from the right click menu.
-
Click Add to add a new claim. You can associate existing security claims or add new security claims and associate them in one step. Claim to role associations can also be removed from this tab, but claims cannot be deleted from here. See Security Role Operations for more information.
To remove the association of a claim to the role, on the Claims tab, highlight one or more rows and click Remove from the top of the grid or select a single row and choose Remove from the right click menu.
-
Click Save to save changes.
Adding or Modifying a Security Role
To add a new security role or update an existing role:
- In the Management Portal, browse to System Settings Icon
> Security Roles and Claims.
-
On the Security Roles and Claims page, select the Security Role tab and click Add from the menu at the top of the grid to add a new security role; or highlight a row and click Edit from the top of the grid or from the right click menu to modify an existing role.
Note: The built-in Administrator role cannot be edited or deleted (except to add user claims to the role)—it is shown as immutable in the grid. -
The page will change to either the Add Security Role or Role information For <role> dialog. Fill in each tab of the dialog with the information desired for the selected security role as described below.
Details Tab
On the details tab, give the role a Name and Description. Commas are not allowed in the name field. Both fields are required. If desired, add an Email Address for the role. This address can be used from workflows to direct email messages to the owner of certificates for uses such as certificate expiration alerts (assuming the certificate owner for the certificates, a security role, has been populated).
In the Permission Set dropdown, select a permission set to apply to the role. For more information about permission sets, see Permission Sets .
Note: Selecting a permission set limits the permissions available for selection in the dialog to those supported by the permission set. If you select a permission set other than the Global permission set, some permissions may not appear in the dialogs. This includes the CollectionThe certificate search function allows you to query the Keyfactor Command database for certificates from any available source based on any criteria of the certificates and save the results as a collection that will be availble in other places in the Management Portal (e.g. expiration alerts and certain reports). Permissions, Container Permissions and PAM Provider Permissions tabs, which only appear if the permissions for these are included in the selected permission set.
If you change the permission set for a role after permissions have already been granted for the role, any permissions not contained in the new permission set will be removed from the role upon save.
Global Permissions Tab
On the Global Permissions tab, check the boxes for the permissions that are appropriate for the new role (see Security Role Permissions).
Figure 410: Grant Global Permissions to a Security Role
Tip: If desired, use the dropdown at the top to enable all the Read boxes (Read Only) or All the boxes (Select All). Click Apply to apply the selection in the dropdown across all permissions. Click Reset to return the dialog to the state it was in when last saved and remove any changes made since opening the permissions for editing. Click Clear to uncheck all the boxes.Note: For the most part, when you grant Modify role permissions to an area in the Management Portal, you must also grant Read role permissions to that same area for that security role to receive full functionality. Granting Modify without Read to a user or a group can result in unexpected behavior. See also Certificate Collection Permissions.Note: Security roles for SSHThe SSH (secure shell) protocol provides for secure connections between computers. It provides several options for authentication, including public key, and protects the communications with strong encryption. key management are structured somewhat differently than those for most of the rest of the product set, as they don't use the standard Read and Modify convention. For more information, see SSH Permissions.
Collection Permissions Tab
Optionally, on the Collection Permissions tab, highlight each certificate collection you would like to set permissions for and click the toggle button for each desired permission (see Certificate Collection Permissions). If you do not opt to set permissions on any collections, the permissions set on the Global Permissions tab will apply to all collections.
Along the top of the Collection Permissions tab, you can see the system-wide certificate collection permissions that have been configured. This is useful for reference. The system-wide settings may also be edited from this tab, if desired.
Any permissions that have been enabled at the system-wide level will not be available for configuration at the collection-level. Toggles for these will be grayed out.
Tip: The search bar at the top of Collection Name column on the collections tab can make it easier to find collections if you have a large number of them.Figure 411: Grant Collection Permissions to a Security Role
Container Permissions Tab
Optionally, on the Container Permissions tab, highlight each certificate store container you would like to set permissions for and click the toggle button for each desired permission (see Container Permissions). If you do not opt to set permissions on any certificate store containers, the permissions set on the Global Permissions tab will apply to all certificate store containers.
Note: Unlike PAM and certificate collection permissions, container permissions are not explicitly listed under global permissions. Instead, they are entirely embedded within certificate store permissions and are not separately highlighted in the certificate store permissions section.Tip: The search bar at the top of Container Name column on the containers tab can make it easier to find certificate store containers if you have a large number of them.Figure 412: Grant Container Permissions to a Security Role
PAM Provider Permissions Tab
Optionally, on the PAM Provider Permissions tab, highlight each PAM provider you would like to set permissions for and click the toggle button for each desired permission (see PAM Permissions). If you do not opt to set permissions on any PAM providers, the permissions set on the Global Permissions tab will apply to all PAM providers.
Figure 413: Grant PAM Provider Permissions to a Security Role
Tip: The search bar at the top of PAM Provider Name column on the PAM Provider Permissions tab can make it easier to find PAM providers if you have a large number of them. - Click Save to save the role.
Copying a Security Role
To copy a security role:
- In the Management Portal, browse to System Settings Icon
> Security Roles and Claims.
- On the Security Roles and Claims page, select the Security Role tab. Highlight a row and click Copy from the top of the grid or from the right click menu to copy an existing role.
-
Give the new role a Name and Description.
Note: Copying a security role will also assign the new role to all the same security claims as the original role. - Click Save to save the new role.
Deleting a Security Role
To delete a security role:
- In the Management Portal, browse to System Settings Icon
> Security Roles and Claims.
- On the Security Roles and Claims page, select the Security Role tab. Highlight a row and click Delete from the top of the grid or from the right click menu to delete an existing role.
- Click OK to the Confirm Operation message.

Was this page helpful? Provide Feedback