About Roles and Permissions Through Common Services
Table of Contents
Expand all | Collapse all
- Get Started with Common Services: Identity & Access
-
- Add an Identity Federation
- Manually Configure a SAML Identity Provider
- Upload SAML Identity Provider Metadata
- Get the URL of a SAML Identity Provider
- Clone SAML Identity Provider Configuration
- Add or Delete an Identity Federation Owner
- Configure Palo Alto Networks as a Service Provider
- Delete an Identity Federation
- Map a Tenant for Authorization
- Update Tenant Mapping for Authorization
- PAN Resource Name Mapping Properties
- Manage Single Tenant Transition to Multitenant
- Release Updates
About Roles and Permissions Through Common Services
Common Services
Learn about
Common Services
roles and permissions for role-based access control
(RBAC).Common Services
: Identity and
Access supports role-based access control (RBAC). Using Identity
and Access, you can manage tenant users, service accounts, and access
to various resources within Common Services
, Strata Multitenant Cloud Manager
, and enterprise apps. Roles are required for users
but are optional for service accounts.Roles work as a union. If you assign a role to a user for a specific app and another role
for All Apps & Services, the user will get the union of both permissions. For
example, consider a scenario where a user is assigned a role for the
Strata Logging Service
app with a role that does not allow download or share
permissions. If that same user is also assigned Superuser role for All Apps &
Services, the user is able to download and share. The behavior is to check the specific
app first and if the permission is not available, then check All Apps & Services.
For more information about what each role can do, you can view the
permissions in the platform for each role. If you have received information about
the transition of your app instance to a tenant or Tenant Service Group (TSG),
see where are my roles? for
a mapping of previous roles to IAM roles.
Permissions
Permissions are actions that are allowed in the system. Permissions represent a specific set of
application programming interface (API) calls that you use to read, write, and
delete objects within the system. You can view the permissions in the
platform grouped into roles.
Multitenant Platform Roles
Multitenant platform roles are a predefined set of permissions for managing tenants
in a multitenant hierarchy. These roles include a collection of one or more system
permissions that are specific to the platform. The following table describes general
roles and responsibilities. For more information about what each role can do, you
can view the permissions in the platform for each role.
Multitenant Platform Roles | Permissions | Supported
Applications |
---|---|---|
Multitenant Superuser | Read and write access to manage all apps, Strata Logging Service logs, and services within the assigned
level of nested hierarchy. Includes all permissions assigned to
all roles, including Superuser. Includes access to dashboards,
create custom dashboards, and download, share, and schedule
reports. Includes the ability to activate product licenses
through email activation link. Assign this role only to users or
service accounts that require unrestricted access. |
|
Multitenant IAM Administrator | Read and write access to identity and authentication functions
for all tenants in a multitenant hierarchy. Restricted to
read-only access for logs. No access to dashboards and Strata Logging Service logs. |
|
Multitenant Manage User | This role provides access to functions related to
multitenant management and other common resources. |
|
Multitenant Monitor User | This role provides access to functions related to
multitenant monitoring and other common resources. |
|
Browser | Browser read-only access to the common services features required
by Palo Alto Networks UI. If
you create a custom
role without the necessary permissions for the UI
to function, an access policy is automatically created for
all apps and services with the Browser role. Assign
this role to web UI users, but not to service accounts or other
non-UI-oriented administrators. |
|
Business Administrator | Read and write access to all subscription and license management
for the selected app. Includes read-only access to other
functions, such as access policies, service accounts, and tenant
service group operations. No access to dashboards and Strata Logging Service logs. Includes the ability to
activate product licenses through email activation link. Assign
this role to administrators who manage devices, licenses, and
subscriptions. |
|
When you add user access or add a service account,
you can assign a predefined
role to execute specific functions within the platform. You
can also assign a batch of
predefined roles to assign a role in bulk to multiple users
or service accounts at the same time.
Enterprise
Roles
Enterprise roles are a predefined set of permissions for managing enterprise applications and
services. These roles include a collection of one or more system permissions for any
app to use. The following table describes general enterprise roles and
responsibilities. For more information about what each role can do, you can view the
permissions in the platform for each role.
Enterprise Roles | Permissions | Supported
Applications |
---|---|---|
ADEM Tier 1 Support | For use with the Prisma Access app. Read-only access to
specific incident remediation workflows for only Prisma Access Autonomous Digital Experience Management
(ADEM). No access to other PPrisma Access services. No
access to dashboards and Strata Logging Service
logs. Assign this role to third party helpdesk employees, tier 2
and 3 support, or administrators who only need ADEM access. |
|
Auditor | Read-only access to functions related to all configurations,
including subscriptions and licenses for the selected app.
Includes access to view dashboards but cannot download, share,
and schedule reports. Includes access to Strata Logging Service logs. Assign this role to
administrators who are tasked with examining the system for
accuracy. |
|
Data Security Administrator | Read and write access to all data security functions for the
selected app. Includes access to Strata Logging Service logs, dashboards, create custom
dashboards, and download, share, and schedule reports. Includes
read-only access to logs. This role includes a very small subset
of privileges included in the Security Admin role. Assign this
role to administrators who manage only decryption rule
configurations. |
|
Deployment Administrator | Access to functions related to deployments. In addition, this
role provides read-only access to other functions. |
|
DLP Incident Administrator | This role provides access to functions related to DLP
incidents and reports. This role also provides read-only access to
other functions, including but not limited to: data profile, data
filtering profile, data pattern, EDM, and OCR settings. |
|
DLP Policy Administrator | This role provides access to functions related to DLP
policy, including but not limited to: data profile, data filtering
profile, data pattern, EDM, and OCR settings. |
|
IAM Administrator | Read and write access to identity and authentication functions
for the selected app. Includes read-only access to logs. No
access to dashboards and Strata Logging Service
logs. Assign this role to administrators who manage users. |
|
Network Administrator | Read and write access to logs and network policy configurations
for the selected app. Includes read-only access to other
functions: alerts, license quotas, devices, and tenant service
group operations. Includes access to dashboards, create custom
dashboards, and download, share, and schedule reports. Assign
this role to administrators who need to maintain authentication,
certificates, and decryption rules. |
|
PA Browser Access & Data Administrator | Read & write access to set and manage access & data
policies, defining custom or private applications, handling end
user requests related to policies and read-only permission to
inventory aspects (users, devices, extensions) and to any
visibility aspects (dashboards, end-user events) within the
Prisma Access Browser management sections |
|
PA Browser Customization Administrator | Read & write access to set and manage browser customization
policies, and read-only permission to inventory aspects (users,
devices, applications, extensions) and to any visibility aspects
(dashboards, end-user events) within the Prisma Access Browser
management sections. |
|
PA Browser Permission Request Administrator | Read & write access to handle end user requests
related to policies and read-only permission to visibility aspects
(dashboards, end-user events) within the Prisma Access Browser
management sections. |
|
PA Browser Security Administrator | Read & write access to set and manage browser
security policies, and read-only permission to inventory aspects
(users, devices, applications, extensions) and to any visibility
aspects (dashboards, end-user events) within the Prisma Access
Browser management sections. |
|
PA Browser Security & Device Posture
Administrator | Read & write access to set and manage browser
security policies, manage device posture groups and set sign-in
rules. It also provides read-only permission to inventory aspects
(users, applications, extensions) and to any visibility aspects
(dashboards, end-user events) within the Prisma Access Browser
management sections. |
|
PA Browser View Only Analytics | Read access to any visibility aspects within the
Prisma Access Browser management sections, including dashboards,
detailed end-user events and inventory aspects (users, devices,
applications, and extensions). |
|
Posture Security Administrator | This role provides full SSPM functionality, but only for the SaaS
applications that the administrators onboard themselves. It is
intended to give IT/SaaS administrators visibility and full SSPM
read and write access to the SaaS apps they are responsible
for. |
|
Security Administrator | Read and write access to logs and security policy configurations
for the selected app. Includes read-only access to other
functions, such as alerts, license quotas, devices, and tenant
service group operations. Includes access to dashboards, create
custom dashboards, and download, share, and schedule reports.
Assign this role to administrators who need to maintain
authentication, certificates, and decryption rules. |
|
SOC Analyst | Access to functions related to logs, reports, events, alerts, and
all configurations for the selected app. Assign this role to
administrators who need to view and investigate threats and
trends. |
|
Superuser | Read and write access to all available system-wide functions for
the selected app. Includes all permissions assigned to all other
roles, including MSP Superuser. Includes the ability to activate
product licenses through email activation link. Assign this role
only to users or service accounts that require unrestricted
access. |
|
Tier 1 Support | Read and write access to remediation workflows that update
network, security, and device configurations for the selected
app. Includes read-only access for alerts, access policies,
configurations, license quotas, devices, and tenant service
group operations. Full access to view dashboards, create custom
dashboards, download, share, and schedule reports, and Strata Logging Service logs. |
|
Tier 2 Support | Read and write access to remediation workflows that update
network, security, and device configurations for the selected
app. Includes read-only access for alerts, access policies,
configurations, license quotas, devices, and tenant service
group operations. Full access to view dashboards, create custom
dashboards, download, share, and schedule reports, and Strata Logging Service logs. |
|
View Only Administrator | Read-only access to all available system-wide functions for the
selected app and logs (except DNS logs). Includes access to view
dashboards except DNS dashboard. No access to download, share,
and schedule dashboards. |
|
Web Security Admin | This role provides access to functions related to web
security for Prisma Access . |
|
When you add user access or add a service account,
you can assign a predefined
role to execute specific functions within a network. You
can also assign a batch of
predefined roles to assign a role in bulk to multiple users
or service accounts at the same time.
View Role Permissions
For more granular information about what each role can do, you can view the
permissions.
- Use one of the various ways to access.Common ServicesIdentity & Access
- Selectto view role permissions.Common ServicesIdentity & Access/Access ManagementRoles
- Select a role, such asAuditorto view the permissions.