How to configure different role permissions for sub-account
The role-based permissions feature of AnyViewer Enterprise Edition is crucial for precise management, rational allocation of permissions, and information security within an organization. Administrators can use the role and permissions functionality to create sub-account user role groups for employees at various levels and set corresponding permissions for each group.
Administrators can assign specific roles with tailored permissions to sub-account users based on departments or job functions, ensuring users only access what they’re authorized to, restrict sub-accounts under different roles to access and operate only certain functions, preventing unauthorized access and potential data breaches.
Use Case Examples:
-
Finance team members can only access finance-related devices.
-
Technical support staff are limited to devices in the support department.
-
Temporary roles can be created for short-term projects and revoked afterward to minimize long-term security risks.
How to Create a New Role
The Any viewer Enterprise Edition Management Center provides a detailed list of two major modules: Device Management and User Management. Let's learn more about it.
When a subaccount is added successfully, the account will be listed in the Use Management-Member list, where you can change the role.
If you want to add a new role. You can click Use Management-Role Permission to create a new role.
In this Role permission page, you can customize role settings, such as modifying the role name, editing permission settings and deleting the role in this interfaced.
How to Configure Role Permissions from Sub-account user
Enterprise Edition now allows you to configure different permission for subaccount user, including user management, device management and controllable devices.
User Management permission
three types of permissions can be set: no permission, view permission, and administrator permission. You can set whether sub-account user under a role have right to access to the User Management page, add sub-account, modify member notes, removing members, creating new roles, or edit role permission.
No permission: if you check this options, the Management Center interface will hide Member List page and Role Permission Page.
View permission: sub-account user can view Member List page and Role Permission Page.
Administrator permission: sub-account user under this role have permission to add sub-account, modify member notes, removing members, creating new roles, and edit role permission
Device Management
it also includes such three options. You can set whether the sub-account user under a role have right to access the Device Management page, or move/delete the deices and so on.
No permission: if you check this options, the Management Center interface will hide Device List page and Application list Page, only list the deployment device list page.
View permission: sub-accounts under this role can view Device List page and the Deployment device list page, and they can deploy device and download the MSI package. But the application list page can be hidden.
Administrator permission: sub-accounts under this role can create/delete/rename groups, or delete controllable devices/move controllable devices groups, and approve application lists.
Controllable equipment
Subaccount users need to add devices to the corresponding role, then Sub-accounts under the corresponding roles can remotely control these devices or manage the devices of each department accordingly.
If devices are not added to the corresponding role, when you log in to a subaccount under that role in the AnyViewer program, the devices will not appear in the devices list.
In conclusion, Enterprise Edition is committed to providing enterprise organizations with more efficient and secure remote desktop solutions, through various measures to enable business managers to rapidly deploy and efficiently manage remote devices within the enterprise. To provide strong support for enterprise information security, and help further improve the enterprise data security architecture.