User Management

This section of the configuration allows to administer the access control over the web interface. The Operations Monitor web resources can be accessed concurrently from multiple network locations. This is done using a traditional user access mechanism.

Figure 7-60 The User Management Panel


User roles in Operations Monitor

A user is a data set whose most important elements are: a log-in name, a password, a set of access rights, the set of relations to other users, and the realm the user has access to; other less significant elements are name, email address, logo image.

The access to the web interface is fragmented into individual, non-overlapping domains. In order to access such a domain, a user needs to have the permission (or right) to do so. These rights, that control which parts of the web interface a user can see, are granted by the parent user that created it. Of course, the user admin has unrestricted access.

The User Management panel:

The left most three of them allow a user to manage his sub-users: Add a new, edit an already added one, or remove a no longer needed user. To modify or delete a sub-user, its parent-user needs to select a row out of the table and press the corresponding button. Both the Add a new user and the Edit user buttons invoke a wizard (in a new window) asking for the needed detail in order to set-up a new or change an existing user. The Add rights...and the Remove rights... buttons make it possible to add selected rights to selected or all users created by the current user, respectively to remove selected rights from selected or all users created by the current user. The rights to add or remove can be selected in a wizard, that is in accordance with the last two pages of the wizard. The Login as selected user button allows a parent user to login as a sub-user without having to enter a password. The Set Column button allows you to hide/unhide columns from display in the table. The Common User KPIs is related to KPI management. For more information, see KPI Management. The Edit own profile button to the right of the page allows the current user to edit one's own profile information.

The User Administrator Role

User Administrator is a role in the Mediation Engine. A user with the User Administrator role can perform only user administrations tasks.

A user created with this role cannot perform any other tasks.

A user with the User Administrator role cannot add or modify own entitlements. The scope of this role is restricted to only Settings > User Management.

Only the admin user can create or delete a user that is assigned the User Administrator role. The admin user can create only one user with this role. Once a user with the User Administrator role is created, all user management entitlements such as create, modify, and delete are disabled for other users created by this user. However, the admin user and the users created by the admin user can still perform user management tasks.

When the admin user deletes the user with User Administrator role, then the admin user falls back to create, modify, or delete any users.

Enable User Roles

Update the system setting to enable a user to assign user roles with pre-defined permissions to a newly created user.

To update the system settings:
  1. Log in to the Mediation Engine.
  2. Navigate to Settings, System Management, System Settings, and User Roles.
  3. Select Enabled.

    Figure 7-61 Update System Setting


    Update System Setting window allows the administrator to assign user roles with pre-defined permissions
  4. Click Update.
    This enables a user to assign roles with pre-defined permissions.

Add the User Administrator User

As the admin user, you can create a user with User Administrator role. A user with this role can perform only user administration functions. This role cannot perform any other tasks using the Mediation Engine GUI.

To add the user with the User Administrator Role:
  1. On the Mediation Engine, click admin, Settings, and User Management.
  2. In the User Management screen, click Add a new User.
  3. In the User Information screen, add information about the new user such as username, Email address, password and so on.
  4. Click Next.
  5. In the Roles screen, select the User Administrator role.

    Figure 7-62 User Administrator Role


    Select User Administrator role

  6. In the Summary screen, review the information of the new user, and click Finish.
    The User Management screen now displays the new user with the User Administrator role.

Tasks List of the User Administrator User

The scope of the User Administrator user is limited to user management tasks. This user cannot perform any other function using the GUI.

User Administrator Tasks

Table 7-15 User Administration Task List

Task Yes/No
Create a User Administrator No
Add or remove rights of the User Administrator user No
Edit an existing user created by the admin user or User Administrator before the upgrade Yes
Delete the admin user No
Delete a non-admin user Yes
Add permissions given to a user Yes
Edit admin user privileges No
Enable an option to force users to change their passwords regularly Yes
Set a period(days) after which users with or without sensitive data are forced to change their password Yes
Enable users to create a new role Yes
Create, edit, delete a user associated with a realm Yes
Allow users to edit privileges assigned to Custom or Administrator roles Yes
In Mediation Engine, logged in as a User Administrator user, add or remove own rights No
In Mediation Engine, logged in as a User Administrator user, edit password settings Yes
In Mediation Engine, logged in as a User Administrator user, create a new user role Yes
Change Administrator role to User Administrator No
Add a New User
  • User Information
  • Selecting a Role
  • User Permissions
  • Add User Realm
  • See the Overview Information
  • Requirements for RADIUS Authentication
Yes
Role Management:
  • Adding a Role
  • Editing a Role
  • Deleting a Role
  • Adding Rights to a Role
  • Removing Rights from a Role
Yes
External Authentication Authorization Yes
Password Settings
  • Enabling or Disabling User Accounts
Yes

Add a New User

We'll next walk through the steps needed to add a new user. The same steps need to be performed for editing a user, with the difference that a field for the name of the new user is present when adding. When editing one's own profile, only the first step of this process is necessary.

User Information

The first step, named User Information, requires providing the log-in name (the username), an optional email address, and a password (asked two times to prevent accidental mistyping) as seen in the graphic. Instead of entering a password, it is also possible to opt for RADIUS authentication, if RADIUS authentication has been set up for this Operations Monitor instance. To learn more about Operations Monitor's RADIUS authentication feature, see "Requirements for RADIUS Authentication".

Figure 7-63 Adding a new user


Adding a new user

A logo image is located in the upper left corner of the user interface. By default, this is the Oracle logo, but it can be customized for each individual user; this is useful when the web interface is accessed by multiple clients of the same provider, sharing the same Operations Monitor setup. The Custom Logo for Reports section provides an upload field where the user can insert the picture to use as a logo.

Note:

The following logo formats are supported: TIF, TIFF, EPS, PDF, JPG, JPEG, GIF, and PNG.

After specifying the path, click Upload to upload the file.

Selecting a Role

After choosing a username and password, the user is given the option of selecting a role providing roles have been defined in addition to the custom role. If no roles are available, the dialogue will continue directly to the realms selection if they exist, otherwise onto the individual permissions selection.

Figure 7-64 Setting a Role for the New User


Default user roles

Note:

If you are creating a user to perform user management tasks only, select the User Administrator role.

User Permissions

In case User Roles is enabled, a role is set for the user that gives the user a predefined set of permissions that are tied to the role. For more information on role management, see the Role Management section.

In case User Roles is disabled, the permissions need to be set individually for each module, and for each setting.

The Permissions for Modules page, is where the parent user can control what the new user will be able to access. The set of permissions are grouped in four, reflecting the grouping of functionality on the actual web interface:

  • General

  • Operations

  • Customer Experience

  • Control Plane Monitor

Each check box in these groups corresponds to a menu item in the main menu of Operations Monitor. If it is checked, the new user will have the corresponding menu item in his main menu.

Figure 7-65 Setting Permissions for Modules for a New User


Setting Permissions for Modules for a New User

The Permissions for Settings page can control what settings the created user will be allowed to modify. The access right to some advanced functionality of Operations Monitor can also be controlled here.

The check boxes in the Settings group to the left of the section roughly correspond to sections in the settings dialog.

The table describes the user setting options.

Table 7-16 User Settings Options

Field Description
General Settings If checked, the user allows access to the General Settings section. The General Settings section of the Operations Monitor Settings dialog box allows the user to view the status of the Operations Monitor server, configure date and time, update the Operations Monitor software or license, view properties of the currently installed license and execute some system-wide actions.
Changing of platform settings

If checked, the created user is allowed to access the Platform Settings section in the Operations Monitor settings dialog.

Changing of prefix tags

If checked, the user is allowed to change the number prefix tags in the Platform Settings. However, the user will still be able to view them even without this permission.

Create users

If checked, the created user is allowed to create and manage new users himself using the User Management section of the Operations Monitor settings dialog.

Grant create users

If checked, the created user can grant the 'Create users' permission described above.

View/Edit all users

If checked, the user is able to see and modify users created by other users.

Create roles

If checked, the user is able to view and modify the roles management section in the user management folder. For more information, see Role Management.

Changing of external devices

If checked, the created user is allowed to access the External Devices section in the Operations Monitor settings dialog.

Changing the system settings

If checked, the created user is allowed to access the Settings section in the Operations Monitor settings dialog.

Modify realms

If checked, the created user is able to view and modify the realms management section of the settings. If the user is assigned a realm, on a previous screen, he will only be able to modify realms that intersect or are contained within the user's own realm.

Set SNMP Export for custom KPIs If checked, user can export the selected metric/KPI via SNMP.

This table describes the user interface setting options.

Table 7-17 User Interface Settings Options

Field Description
View SIP messages If checked, the created user can see only the SIP message headers in the messages tab of the Call Details window and in the Registration Details window. For more information, see Calls and Registrations.
View SIP message details If checked, the created user can view SIP message bodies in the messages tab of the Call Details window and in the Registration Details window.

For more information, see Calls and Registrations.

Message bodies cannot be captured in packet capture downloads unless they are set as viewable to the user.

View Media Info  
Create PDF reports If checked, the new user can create PDF call reports on the Calls page.

For more information, see Calls.

View registration history If checked, the new user is allowed to see the registration history of a platform user in the User Tracking page. For more information, User Tracking.
View Subscriptions in User Tracking  
Incremental User Search If checked, the new user is allowed to use the incremental user search on the User Tracking page. For more information, User Tracking.
Read the Session Monitor manual If checked, the new user is allowed to see the online version of the Operations Monitor User's Guide.
Change the dashboard page If checked, the new user is allowed to add and remove items from the Dashboard page.
May always log in If checked, the new user is always allowed to log in, even if the concurrent session limit for one user or the global concurrent session limit is surpassed. In case the global concurrent session limit is surpassed, another user will be logged out in order to allow this user to log in.
Save calls If checked, the new user is allowed to save calls for further debugging.
View saved calls from other users If checked, the new user is allowed to view the saved calls created by other users.
View all realms If checked, the new user is allowed to view all the realms not only the ones created by itself.
RTP Header Recording If checked, the new user is allowed to record the header part of RTP packet in a call.
RTP Payload Recording (including DTMF) If checked, the new user is allowed to record the entire RTP packets of a call. This includes audio, video, and image data, voice quality data, and DTMF tones.
RTCP Recording If checked, the new user is allowed to record RTCP voice quality data.
View DTMF Tones If checked, the new user is allowed to view DTMF tones in the call flow diagram and to see the presence of DTMF tones in a call in the calls grid.
ISR Recording If checked, user will be able to configure ISR access and listen to the ISR audio call recordings.
KPI Management If enabled for a user, then the user can access the KPI Management page to create, edit and modify the custom templates.
Expand KPI A user with this permission can create or enable the custom user KPIs. A user without this permission will not be able to create that counter for a device or tag type or any KPI in platform wide list or the Bulk KPI page. An error message is displayed.
Shrink KPI Users with this permission can delete the custom user KPIs.
UCaaS CCaaS Calls Settings This user permission defines whether the user can view and modify the UCaaS CCaaS Settings or not.

User Realm

The second step sets the realms that the future user will be able to access.

A user assigned to a realm can only see devices that are also assigned to that realm. Users assigned to the realm ALL are unrestricted and can see all devices, regardless of the realm the device is assigned to. For more information about the realm concept in Operations Monitor, see Realms Definitions

On the KPI/Metrics page, users also only see the devices listed in their assigned realm. For more information, see KPI/Metrics

A user can access either one or ALL the realms.

Figure 7-66 Setting Realm for a New User


Realms

Overview Information

The summary screen gives a brief overview of the new user. Included is the username, email address (if entered), role, realm and permissions bitmask.

Figure 7-67 Summary of the New User


Summary screen for adding a new user

Requirements for RADIUS Authentication

When a user logs in, Operations Monitor supports RADIUS authentication if it has been enabled in the RADIUS Authentication section of the Settings dialog box. RADIUS authentication is performed if it has been enabled for the user.

For RADIUS authentication to work, the RADIUS server has to respond to the Operations Monitor access request sent with the set of required user attributes. Operations Monitor sends its access request with a configurable NAS_Identifier attribute, which can be used to identify requests from Operations Monitor on the server side, and with the encrypted password as the Password attribute. Upon successful authentication, Operations Monitor expects the following user attributes:

Table 7-18 RADIUS Authentication User Attributes

Attribute Description

PLD-User-First-Name

Not applicable.

PLD-User-Last-Name

Not applicable.

PLD-User-Email

(Optional) The e-mail address of the user.

PLD-User-Realm

The integer realm ID of the user's realm.

PLD-User-Creator

The user ID of the parent user for the user.

PLD-User-Permissions

A bitmask describing the permissions of the user.

PLD-User-Logo

(Optional) A field containing the logo image for the user.

PLD-User-Options

A JSON-encoded object describing per user options.

The numeric IDs for these user attributes are defined in a RADIUS dictionary file, which is delivered together with Operations Monitor.

Note:

The PLD-User-First-Name and PLD-User-Last-Name fields in the radius definition are not used.

The PLD-User-Permissions attribute deserves special explanation. It contains a bitmask describing the permissions that a user has. Each of the permissions introduced above has a position in the bitmask. To generate a specific permissions bitmask you can use the wizard for adding users (choose RADIUS authentication on the first page of the wizard, then select the appropriate permissions, and the permissions bitmask will be displayed on the last page of the wizard).

Role Management

Note:

User Roles cannot work together with RADIUS Authentication.

In this folder of the Operations Monitor settings, the user roles are administered to define default sets of permissions for users. It is not required to assign a role to a user, however it is recommended as it simplifies the user creation process.

For instance an administrator role would generally contain all permissions, a power user may contain most screens and a subset of system permissions, and a basic user a subset of screens. During the user creation process if a role other 'custom' is selected, then later on the individual permission check boxes will be skipped.

Note:

Regarding role management, the terms permissions and rights are used interchangeably.

Figure 7-68 Roles


Roles

Note:

By default, the roles feature is disabled. In order to make use of the roles, the User Roles system setting must be enabled. For more information, see Enable User Roles.

Adding a Role

Adding a role is performed after selecting the Add a new role button. As shown in the images below, this is equivalent to the permissions screens of adding a new user, however after setting the permissions there is a prompt for the role name, the role name is mandatory.

Figure 7-69 Setting Permissions for Modules for a New Role


Modules permissions

Figure 7-70 Setting Permissions for Settings for a New Role


Settings Permissions

Figure 7-71 Setting the Name of the Role


Name of the New Role

Editing a Role

After selecting only one role, it may be edited by selecting the Edit option in the role management panel. When multiple roles are selected this option is not available.

Deleting a Role

Deleting a role may also only be performed after selecting a single role. There is a confirmation prompt that must be confirmed before the role is deleted.

Adding Rights to a Role

One can either add rights to a selected role or generally to all roles. In the User Roles dialog box, select the role which needs to be modified and click Add Rights. Select one of the two options:
  • to selected roles
  • to all roles
The following procedure is equivalent to the normal role dialog, only without the option to change the role name. The selected check boxes designate the rights that will be added to the selected role(s) or all roles.

Removing Rights from a Role

Likewise, one can remove rights from individual roles or generally across all roles. In the User Roles dialog box, select the role for which rights need to be removed, and click Remove Rights. Select one of the two options:
  • from selected roles
  • from all roles

Removing rights is the mirror process to adding rights, with the selected check boxes will be removed from the selected role(s) or all roles.

External Authentication Authorization

The Mediation Engine Connector supports authenticating users using an external authentication provider, such as LDAP, RADIUS. This authentication must be configured on the reverse proxy (NGINX or Apache), which acts as a gateway for the Mediation Engine. Authorization for the user must be done using Mediation Engine permissions, as described in the section, "Add a New User".

External authentication is controlled by the system setting, External authentication enabled. When enabled, the X-Forwarded-User HTTP header set by the reverse proxy must contain the authenticated user's login name.

Password Settings

In this folder of the Operations Monitor settings, you can define the password settings that are followed by users.

To modify the password settings:

  1. From the Settings screen, click Password Settings.

  2. To enforce users to change their password regularly, set the time period by doing the following:

    1. Select Force users to change their password regularly.

    2. Enter the number of days in the Period in days to force password change for users with access to sensitive data field. The default setting is 90 days

    3. Enter the number of days in the Period in days to force password change for users without access to sensitive data field. The default setting is 180 days.

    4. Click Save to save the changes or click Cancel.

      Note:

      The entries in these fields are applied when the user changes the password next time.

  3. Enforce stringent password rules by doing the following:

    1. Select Enforce stringent password rules to increase the level of security required in user passwords.

      Note:

      A stringent password:

      • Should not begin with a digit

      • Must contain at least one uppercase letter

      • Must contain at least one lower case letter

      • Must contain at least one digit

      • Must contain a special character such as @, #, $, -, _

      • Must be different from the previous password

      The account locking is enabled.

    2. By default, the account gets locked after three unsuccessful attempts for 15 minutes. To change the default account locking time, open the /etc/iptego/vsp.conf file, in the usermanagement section, enter the value in seconds against the unlock_admin_timeout key after which accounts get unlocked.

    3. Click Save.

Enabling or Disabling User Accounts

To enable or disable the user accounts:

  1. Login to Operations Monitor as admin.

  2. From Settings, click User Management.

  3. Select the user you want enable or disable the account and click Edit.

  4. Do one of the following:

    • To enable the suspended user account:

      1. Deselect the Account disabled check box and click Next.

        The Permission for Modules screen appears.

      2. Assign the required permissions for modules by selecting the check box and click Next.

        The permissions for Settings screen appears.

      3. Assign the required permissions for settings by selecting the check box and click Next.

        The Summary screen appears.

      4. Verify the summary and click Finish.

      The user account is enabled.

    • To suspend an user account:

      1. Select the Account disabled check box and click Next.

        The Permission for Modules screen appears.

      2. Click Next.

        The permissions for Settings screen appears.

      3. Click Next.

        The Summary screen appears.

      4. Verify the summary and click Finish.

      The user account is disabled.

View Logged in Users in the Mediation Console

As a privileged Linux user with root access, you can run the palladion-print-logged-users CLI command from the Mediation Engine console to view the users who are currently logged in.

To view the logged in users:
  1. Log in with root access to the Mediation Engine console.
  2. Run the command: palladion-print-logged-users.
    The list of users who are currently logged in is displayed on the console.

Log Out Users in the Mediation Engine Console

As a privileged Linux user with root access, use the palladian-logout-user CLI command to log out a specific user or users using the Mediation Engine console.

To log out a user in the Mediation Engine Console:
  1. Log in with root access to the Mediation Engine console.
  2. Use the following command to log off a user or multiple users:
    • Syntax:

      palladian-logout-user <user name>

      palladian-logout-user <user name>

    A list containing the user names along with the number of users logged out is displayed on the console.