Skip to content

Container permissions

First of all, you will need to familiarise yourself with our "container" based authorisation system. All objects like users, hosts, contacts, templates etc. are bound to containers.

Danger

Permissions can become a very complex topic! - We strongly advise you not to skip this section!

/root Container

The "/root" container is a rather special entity. All objects assigned to this container are globally visible to all users! This means this container is intended for global, frequently used objects such as the "ping" service template or the "24x7" timeperiod.

If you assign a host to the "/root" container, it is not possible to change the container assignment later!

Users assigned to the "/root" container automatically become global administrators with full privileges to all objects.

Global admins are marked by a crown above their username:

global admin crown

Container tree

Containers are laid out in a tree-like structure. The "/root" container is always the "root" of all subsequent containers. The next level in the tree could be a "tenant". Tenants can be departments in your company or even completely different companies altogether. Within a tenant you can create "nodes". This can be helpful when you need to map out entire company structures in your monitoring system.

Following this example, a container tree structure would look like this: /root/client/node/.

To illustrate this, let's create a tenant called "Demo Tenant" under Administration -> Container Management -> Tenants

tenant container add

The container tree now looks like this: /root/Demo Tenant/.

In the next step we create nodes within the "Demo Tenant" by going to Management -> Container Management -> Container

nodes

In this example we create a separate node for the "Data Centre Team" and the "Developers". This allows each team to create their own hosts within their own containers.

Our container tree now looks like this:

/root/Demo Tenant/Team Data Center
/root/Demo Tenant/Team Developers

You can also assign users to different levels in the container tree.

  • If you assign a user to the /root/ container, that user becomes a global administrator and has access to all objects in all tenants
  • If you assign a user to the container /root/Demo Tenant Tenant, the user will have access to all objects within the tenant as well as all sub-containers
  • • If you assign a user to the /root/Demo Tenant/Team Developers container, the user will have access to all objects inside the "Team Developers" container as well as all of its sub-containers

It is also possible to give all users read and write permissions to each container. To do this, navigate to Management -> User Management -> Manage Users and create a new user. You can now select all the containers that the user should have access to and assign read and write permissions for each individual container.

User container permissions

Although the container-based authorisation model can become very complex, it offers the greatest possible flexibility and enables the granular management of authorisation options.

Note

Since openITCOCKPIT 4, container permissions can also be mapped in "user container roles".