Difference between revisions of "System-User Roles"

From CNM Wiki
Jump to: navigation, search
(Script)
(Script)
Line 19: Line 19:
 
:Some permissions such as appointing other administrators and alternating the algorithms must be done manually. In [[cyber-security]], those operations are called [[identity and access management]] ([[identity and access management|IAM]]).
 
:Some permissions such as appointing other administrators and alternating the algorithms must be done manually. In [[cyber-security]], those operations are called [[identity and access management]] ([[identity and access management|IAM]]).
  
'''[[CNM Cyber SSO]]''' is the successor [[lectio]].
+
'''[[Federated vs System Roles]]''' is the successor [[lectio]].
  
 
==Quiz==
 
==Quiz==

Revision as of 00:00, 25 April 2020

System-User Roles (hereinafter, the Lectio) is the lesson part of the CNM Cabin Essentials lesson that introduces its participants to CNM Cabin. This lesson belongs to the CNM Cyber for Experience session of the CNM Cyber Welcome Course.


Content

The predecessor lectio is User Data at Cabin.

Key terms

System-user role. The set of capacities often called permissions that a system grants to any user who belongs to a particular role.

Script

The bulk of permissions are granted automatically. CNM Cabin controls your access to various resources such as applications, networks, and services. You have started here, at CNM Cyber, as a newbie with minimal rights. The more you learn here, the more system access permissions CNM Cabin grants.
To accomplish that task, CNM Cabin assigns every user with his or her system-user role. For instance, any user of the World Wide Web has NetAnyone's rights at CNM Cyber. He or she can view pages of CNM Page, CNM Tube, and CNM Wiki, but cannot edit anything. CertStudents are enrolled into this very welcome course, as well as can post comments on CNM Page and CNM Tube. CertUser's can join communities at CNM Social, and so on.
Some permissions such as appointing other administrators and alternating the algorithms must be done manually. In cyber-security, those operations are called identity and access management (IAM).

Federated vs System Roles is the successor lectio.

Quiz