Skip to main content

Netskope Help

Cloud Exchange Users

New users can be added only by the Super Admin (user with the admin user name). There are these types of user roles:

  • Admin: An Admin has write level access to the application, and will be able to create configurations, upload plugins, configure sharing, and edit settings.

  • Read-only User: The read-only user will have limited access to the application, and will not be able to perform any edit or update actions on plugins and their configuration settings.

  • Custom Admin: The users can be given custom read/write permissions so they can perform module-specific admin actions based on the type of permissions provided.

The Users page displays all the current users in a table. Users can be edited or deleted.

image52.png

New users can be created by clicking the Add User icon in the upper right corner. Create a user by entering these parameters:

  • Username: Username associated with this account.

  • Password: Initial password for the user. User will be prompted to change password at the first login.

  • User Role: Super admin, Read-only User or Custom User roles can be assigned. The Custom User can have module-specific read/write permissions (refer to User Roles below). Enable the check boxes to give the Custom User API access and the ability to generate API tokens.

image53.png

When finished, click Save.

User Roles
Admin User

This user will have write level access to the application. Users will be able to create configurations, upload plugins, configure sharing and edit settings.

Admin users will not be able to create new users.

Read-Only User

The read-only user will have limited access to the application. This user will not be able to perform any edit/update action on plugins and their configuration and settings.

Custom User

The custom user can be given module-specific permissions that allow the following actions:

Read

Write

Settings

  • Read only logs settings. General > Logs tab.

  • Read only proxy settings. General > Proxy tab.

  • Read only tasks cleanup settings. General > Task Cleanup

  • Read only SSO configuration. Users > SSO Configuration

  • Read only Plugins page. Need module wise read role to see the plugin list

  • Read only Plugin Repository page.

  • Read only Netskope Tenants page.

  • Change logs settings.

  • Change proxy settings.

  • Change SSO Configurations.

  • Change tasks cleanup settings.

  • User can upload new plugin from Plugins page. Need module wise write role to configure the plugin.

  • User can add, delete or update plugin repositories. User can perform all actions.

  • User can add, update or delete Netskope Tenants.

Log Shipper

  • Read only settings of Cloud Log Shipper. User can open mapping files in read only format.

  • Read only Log Shipper plugins on Plugins page.

  • Read only configured Log Shipper plugins.

  • Read only business rules.

  • Read only SIEM Mappings page.

  • User can change Log Shipper settings. User can add, update or delete the mapping files.

  • User can configure, edit, delete or disable the configured Log Shipper plugins.

  • User can perform all actions on Business Rules.

  • User can perform all actions on SIEM Mappings.

Ticket Orchestrator

  • Read only Ticket Orchestrator.

  • Read only Ticket Orchestrator plugins on Plugins page.

  • Can view configured Ticket Orchestrator plugins.

  • Read only Alerts page.

  • Read only Business Rules page.

  • Read only Queues configuration page.

  • Read only Tickets page.

  • Can change Ticket Orchestrator Settings.

  • User can configure new Ticket Orchestrator plugin. User can edit, delete and disable the existing plugins.

  • User can delete alerts on Alerts page.

  • User can perform all actions on business rules.

  • User can perform all actions on Queues configuration.

  • User can see and delete tickets on Tickets page.

Threat Exchange

  • Read only Threat Exchange settings page.

  • Read only available Threat Exchange plugins on Plugins page.

  • Read only configured Threat Exchange plugins page.

  • Read only Threat IoCs page. User can not delete, modify or add tags to the IoCs.

  • Read only Business Rules.

  • Read only Sharing configuration.

  • Read only Tags page. User can not add or delete tags.

  • Can change Threat Exchange settings.

  • User can configure Threat Exchange plugin, update the existing one, disable the plugin and delete plugins.

  • User can delete and tag Threat IoCs.

  • User can perform all actions on business rules.

  • User can perform all actions on Sharing Configuration.

  • User can create or delete tags.

Risk Exchange - User

  • Read only User Risk Exchange settings.

  • Read only User Risk Exchange plugins on Plugins page.

  • Read only configured User Risk Exchange plugins.

  • Read only Plugin Activity page.

  • Read only Business Rules page.

  • Read only Actions page.

  • Read only Users page. User cannot perform actions on Users.

  • Read only Hosts page. User cannot perform actions on Hosts.

  • Read only Action Logs page.

  • User can change User Risk Exchange Settings.

  • User can configure, edit, delete or disable the configured User Risk Exchange plugins.

  • User can see Plugin Activity page.

  • User can perform all actions on Business Rules.

  • User can perform all actions on Actions page.

  • User can delete users, mute or change the score of particular users from Users page.

  • User can delete hosts, mute or change the score of particular hosts from Hosts page.

  • User can see Action Logs page.

Risk Exchange - Application

  • Read only Application Risk Exchange plugins under Plugins page.

  • Read only configured ARE plugins.

  • Read only Applications page.

  • Read only Business Rules.

  • Read only Sharing page.

  • User can configure, edit, delete or disable the configured ARE plugins.

  • User can see Applications data or delete data.

  • User can perform all actions on Business Rules.

  • User can perform all actions on Sharing Configuration.

RBAC Privillages
API Access

If this role is given then user can create new api token under Users -> API Tokens. User can access API Docs page as well.

Logs Access

If this role is given then user will be able to access Logging page and Tasks page.