Work with user groups in Remediate

Sections

Puppet Remediate provides a limited number of roles that allow you to control what users can and can’t do.

The following permission groups are available to add to accounts:

Permission Group Description
accept-risk Accept risk for a given vulnerability on selected nodes.
add-credential Add access credentials for a node.
add-source Add a vulnerability scanner or infrastructure source.
add-task Add a new remediation task.
admin Complete first-run configuration. Members of this group also have all the permissions of the admin superuser role except the ability to login into the user administration UI and manage users.
remove-credential Remove access credentials for a node.
remove-source Remove a vulnerability scanner or infrastructure source.
remove-task Remove a new remediation task.
run-task Run a remediation task.

When using LDAP, you may want to grant a certain user group full permissions but restrict other user groups to more limited permissions.

This following example describes a sample scenario. It shows how to grant everyone in the LDAP group called secops full permissions, while letting all other users just run tasks.

To achieve this, we'll configure 2 LDAP providers with default mappers, and assign a different priority to each provider.

  1. In the main Remediate UI, click User admin on the navigation sidebar.
    The user admin login page is displayed.
  2. Log in with the user administration UI administrator username and password. For more information on setting the user administration UI admin user password, see Configuring Remediate.
  3. On the sidebar, click User Federation and select ldap from the drop-down list.
  4. Create an LDAP Provider for the secops user group:
    1. Set the Priority to 0. This is the highest priority.
    2. Specify a Custom User LDAP Filter that only includes members of secops. As in the following example:
    secops LDAP provider
    For a full step-by-step guide to creating an LDAP provider, see LDAP configuration.
  5. Click Save when you are done.
  6. Next, create default mappers for each default permissions group you want to assign to the secops user group.
    This example shows a mapper for the add-source permission: group:
    add-source permission user federation mapper
    For a full step-by-step guide to creating a default mapper, see LDAP mappers.
  7. Create an LDAP Provider for all other users:
    1. Set the Priority to 10. This number must be lower than 0 so that users are evaluated initially against the first LDAP provider, and then only this provider if they are not members of the secops LDAP group.
      all users ldap provider
      For a full step-by-step guide to creating an LDAP provider, see LDAP configuration.
    2. Add default mapper for this second group to let all users run tasks by default. As in the following example:
      run -task default mapper
      For a full step-by-step guide to creating a default mapper, see LDAP mappers.
How helpful was this page?

If you leave us your email, we may contact you regarding your feedback. For more information on how Puppet uses your personal information, see our privacy policy.

Puppet sites use proprietary and third-party cookies. By using our sites, you agree to our cookie policy.