{"id":736,"date":"2015-08-13T08:48:39","date_gmt":"2015-08-13T08:48:39","guid":{"rendered":"http:\/\/www.davidpapkin.net\/?p=736"},"modified":"2015-08-13T08:48:39","modified_gmt":"2015-08-13T08:48:39","slug":"planning-and-configuring-role-based-administration-in-sccm-2012-r2","status":"publish","type":"post","link":"https:\/\/davidpapkin.com\/?p=736","title":{"rendered":"Configuring Role-Based Administration in SCCM 2012 R2 by David Papkin"},"content":{"rendered":"<p>This post by David Papkin\u00a0Configuring Role-Based Administration in SCCM 2012 R2<\/p>\n<p>Microsoft\u00ae System Center 2012 Configuration Manager and System Center 2012 R2 Configuration\u00a0Manager implement role-based access control (RBAC). With RBAC, you can use security roles, security scopes, and collections to define access permissions for your administrative users.<\/p>\n<p><strong>Overview of Role-Based Administration<\/strong><br \/>\nYou can use role-based administration in Configuration Manager to centrally define security settings\u00a0and to delegate administrative tasks to users or groups. You can assign an administrative user one or more security roles that represent a set of administration tasks. The security role includes all permissions necessary to complete the tasks that relate to the role. For example, you can assign the Application Deployment Manager security role to a user who will manage application deployments. This role automatically grants permissions to deploy applications to computer devices or users.You can further define the objects that a security role can administer, thereby limiting administrative access to specific collections and security scopes. You can use a security scope to associate specific objects with one or more administrative users. For example, you can give an administrator permission to deploy<br \/>\nonly specific applications by associating those applications with a security scope, instead of permissions to deploy all applications.<br \/>\nAdministrative users can see only the objects that they have permission to manage, which the security role, security scope, and collection define.<br \/>\nYou can use the built-in security roles and scopes, or you can create your own custom security settings to use throughout the hierarchy. When you create administrative users, you configure and replicate security assignments throughout the central administration site and the hierarchy\u2019s primary sites.<\/p>\n<p><strong>Security Roles<\/strong><br \/>\nA security role is a group of permissions that are necessary for performing specific administrative tasks. The role consists of individual permissions for each object type that an administrative user is allowed to manage.\u00a0For example, the Application Administrator role<br \/>\nhas a cumulative set of permissions that define its security role. This role consists of a set of<br \/>\nindividual permissions to manage a variety of objects, including the following permissions for<br \/>\napplication objects:<br \/>\n\u2022 Approve<br \/>\n\u2022 Create<br \/>\n\u2022 Delete<br \/>\n\u2022 Modify<br \/>\n\u2022 Modify Folder<br \/>\n\u2022 Move Object<br \/>\n\u2022 Read<br \/>\n\u2022 Modify Report<br \/>\n\u2022 Set Security Scope<\/p>\n<div id=\"attachment_739\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/08\/SecurityRoles.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-739\" class=\"size-medium wp-image-739\" src=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/08\/SecurityRoles-300x200.jpg\" alt=\"A security role is a group of permissions that are necessary for performing specific administrative tasks. The role consists of individual permissions for each object type that an administrative user is allowed to manage.\" width=\"300\" height=\"200\" srcset=\"\/wp-content\/uploads\/2015\/08\/SecurityRoles-300x200.jpg 300w, \/wp-content\/uploads\/2015\/08\/SecurityRoles.jpg 670w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-739\" class=\"wp-caption-text\">A security role is a group of permissions that are necessary for performing specific administrative tasks. The role consists of individual permissions for each object type that an administrative user is allowed to manage.<\/p><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>You can use scopes and collections to limit access by administrative users to individual object instances because the roles themselves do not specify user permissions for individual objects.<br \/>\nConfiguration Manager includes 15 built-in roles that include permissions for executing typical tasks on different types of objects.\u00a0You cannot modify or delete the built-in roles, but you can create custom roles to match special administrative requirements.<\/p>\n<p><strong>Built-In Roles<\/strong><br \/>\nConfiguration Manager includes the 15 built-in security roles that the following table lists. Each<br \/>\nrole gives specific permissions to an administrative user to perform actions on certain types of<br \/>\nobjects.<\/p>\n<p><a href=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/08\/Bui8ltinROles.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-738\" src=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/08\/Bui8ltinROles-300x200.jpg\" alt=\"Bui8ltinROles\" width=\"300\" height=\"200\" srcset=\"\/wp-content\/uploads\/2015\/08\/Bui8ltinROles-300x200.jpg 300w, \/wp-content\/uploads\/2015\/08\/Bui8ltinROles.jpg 670w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Planning Role-Based Administration<\/strong><br \/>\nConfiguring role-based administration requires careful consideration. When you plan to add an<br \/>\nadministrative user, you must consider the security roles, security scopes, and collections.<br \/>\nWhen planning security configuration, consider the following factors:<br \/>\n\u2022 Security roles control what you allow an administrative user to do.<br \/>\n\u2022 Security scopes control the securable Configuration Manager objects that the<br \/>\nadministrative user can administer.<br \/>\n\u2022 Collections control the users and devices that an administrative user can manage.<br \/>\n\u2022 You must assign an administrative user to at least one security scope.<br \/>\n\u2022 You can map each administrative user to separate security scopes and collections.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/www.davidpapkin.net\/wp-content\/uploads\/2015\/08\/planningROleBasedAdmin.jpg\" alt=\"\" width=\"332\" height=\"221\" \/><br \/>\nThis video Planning and Configuring Role Based Administration in SCCM 2012 R2 by David Papkin<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/4YRiADPl0l8\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>This concludes this post by David Papkin\u00a0Configuring Role-Based Administration in SCCM 2012 R2<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post by David Papkin\u00a0Configuring Role-Based Administration in SCCM 2012 R2 Microsoft\u00ae System Center 2012 Configuration Manager and System Center 2012 R2 Configuration\u00a0Manager implement role-based access control (RBAC). With RBAC, you can use security roles, security scopes, and collections to&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4,8,10,17],"tags":[59,66,67,70,118,135,160],"class_list":["post-736","post","type-post","status-publish","format-standard","hentry","category-computers","category-david-papkin","category-microsoft","category-sccm","category-system-center","tag-configuration-manager","tag-david-mark-papkin","tag-david-papkin","tag-davidpapkin","tag-microsoft-system-center","tag-sccm","tag-system-center-2012"],"_links":{"self":[{"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/posts\/736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=736"}],"version-history":[{"count":0,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=\/wp\/v2\/posts\/736\/revisions"}],"wp:attachment":[{"href":"https:\/\/davidpapkin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davidpapkin.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}