Managing User Access
Establish the Seeker user base and enable user access to various features and operations.
Tasks | Information |
---|---|
1. Get familiar with the Seeker's role-based access control (RBAC) concept. | User Administration |
2. Enable user authentication and simplify user management by connecting to your organizational LDAP/Active directory. | Configure LDAP/Active Directory |
3. Define and configure global and project roles. | Manage Roles |
4. Define groups and assign them to roles. If LDAP authentication is used, users get permissions according to the LDAP groups mapped to their Seeker groups. |
Manage Groups |
5. Define users and assign them to groups, only if you are not using
LDAP user authentication. When an LDAP user, assigned to an authorized LDAP group, logs on to Seeker for the first time using his or her LDAP credentials, the corresponding Seeker user is automatically created. The user is assigned to the same roles as the corresponding Seeker groups as well as to the built-in everyone group. This grants the user the group’s roles and eliminates the need to manually define individual users and assign them to groups in Seeker. |
Manage Users |
6. Assign members (users and groups) to projects. | Manage Project Membership |
7. Optionally, enable user single sign-on to Seeker by configuring Seeker with your 3-rd party identity provider (IdP). | Configure SAML 2.0-based SSO |