This section describes the management of service privileges for a Launchpad user.
When new users are created, they must be explicitly assigned service privileges or an appropriate profile must be set. Similarly, you can change service privileges or profile while editing users. If you have assigned the Custom profile to the user you can configure permissions on Launchpad as well as other Launchpad services. If the selected profile is other than Custom, you can configure permissions on Launchpad, but not on other Launchpad service. You can customize the privileges on all Launchpad services for a user with Custom profile. Refer to Assign Profile section to assign profile.
When you assign user management privileges to a user with Custom profile, he is able to add, edit, delete users. This means that he is able to add a user account, edit user account information, and delete user account.
When you assign service privileges to a user with Custom profile, he or she is able to access the services that have been turned on for him or her. The user is able to perform service-related operations depending on the privileges on the role assigned to him or her on that service. When you assign service privileges to a user, you must turn on the individual services that you want to provide access to, and assign a service-specific role to this user on the each service. The user is able to access the service only when a service-specific role has been assigned to the user.
The service privileges for a user with Custom profile can be changed as many times as needed.
When you assign privileges to a user, he is able to configure the customer level options such as lockout policy and minimum password length under Admin>Settings tab.
To assign service privileges to a user with Custom profile, perform the following steps.
Select the check boxes based on the privileges you want to assign to the user.
Field |
Description |
User Management |
To allow user to manage Launchpad users. |
Key Management |
To allow user to manage keys used by third party applications to access Launchpad through API calls. |
Settings |
To allow user to manage customer level options such as lockout policy and minimum password length for Launchpad users. |
Device Registration |
To allow user to manage Arista device registration with a Launchpad service. |
Click Save to save the assigned privileges for the user.
When you work with Guest Manager or Wireless Manager, you can assign rights on portals or locations respectively. The list of portals and locations are stored in the server cache for two hours after loading Service Privileges. If you are unable to see a recently created portal or location in the list, click the Refresh icon to refresh the list. The Refresh icon is seen on the right above the list of portals or locations, as the case may be.
Guest Manager facilitates guest management and analytics.
Guest Manager defines the user roles, Administrator, Operator, Analyst and Marketing Executive.
An Administrator user has complete access on the Guest Manager account. This user has portal management privileges and can also access analytics and log information.
An Operator has very limited access. An Operator can manage guest users only for the portals assigned to him or her.
An analyst can view analytics across all portals.
A Marketing Executive can configure Campaigns and can manage custom reports. A Marketing Executive can view and download Analytics data.
The following table lists the functionality-wise user privileges for Administrator, Operator, Analyst and Marketing Executive user types.
Functionality-wise User Privileges |
|||||
Functionality | Operation | Administrator | Guestbook Operator | Analyst | Marketing Executive |
User Management | View user | Yes | No | No | No |
Create user | Yes | No | No | No | |
Edit user | Yes | No | No | No | |
Delete user | Yes | No | No | No | |
Portal Management | View portal | Yes | No | No | No |
Create portal | Yes | No | No | No | |
Edit portal | Yes | No | No | No | |
Configure portal | Yes | No | No | No | |
Configure social media plug-ins | Yes | No | No | No | |
Delete portal | Yes | No | No | No | |
Wi-Fi/WIPS Server Management |
Add server | Yes | No | No | No |
Edit server | Yes | No | No | No | |
Sync server | Yes | No | No | No | |
Configure sync settings | Yes | No | No | No | |
Delete server | Yes | No | No | No | |
Guest Management | Configure guestbook | Yes | No | No | No |
Create guest user | Yes | Yes | No | No | |
View guest user | Yes | Yes | No | No | |
Modify guest user | Yes | Yes | No | No | |
Delete guest user | Yes | Yes | No | No | |
Import/export guest users | Yes | Yes | No | No | |
Enable/disable guest users | Yes | Yes | No | No | |
Create guest user batch | Yes | Yes | No | No | |
Export guest user batch | Yes | Yes | No | No | |
View guest user batch | Yes | Yes | No | No | |
Delete guest user batch | Yes | Yes | No | No | |
Analytics | View Graphs | Yes | No | Yes | Yes |
View Visitors log | Yes | No | Yes | Yes | |
Download Visitors log | Yes | No | Yes | Yes | |
Log Management | Download guest access logs | Yes | No | No | No |
Download user audit logs | Yes | No | No | No | |
Download SMS logs | Yes | No | No | No | |
Dashboard | View dashboard | Yes | No | Yes | No |
Download dashboard as PDF file | Yes | No | Yes | No | |
Schedule Dashboard Report | Yes | No | Yes | No | |
Reports | Create Report | Yes | No | Yes | Yes |
Schedule Report | Yes | No | Yes | Yes | |
Replicate Report | Yes | No | Yes | Yes | |
Download Report | Yes | No | Yes | Yes | |
Email Report | Yes | No | Yes | Yes | |
Delete Report | Yes | No | No | Yes | |
Campaigns | View Campaign | No | No | No | Yes |
Edit Campaign | No | No | No | Yes | |
Rename Campaign | No | No | No | Yes | |
Replicate Campaign | No | No | No | Yes | |
Publish Campaign | No | No | No | Yes | |
Assign Campaign to Portal | No | No | No | Yes | |
Delete Campaign | No | No | No | Yes |
To assign service privileges for Guest Manager, perform the following steps.
Wireless Manager defines four user roles, Superuser/Poweruser, Administrator, Operator and Viewer. The Superuser/Poweruser has all privileges while a viewer has very limited privileges.
The following table lists the functionality-wise user privileges for Poweruser, Administrator, Operator and Viewer user types.
Functionality-wise User Privileges |
|||||
Functionality |
Operation |
Poweruser |
Administrator |
Operator |
Viewer |
System Settings and Operating Policies |
Options under Configuration>System Settings |
Yes |
Yes |
No |
No |
AP auto-classification |
Yes |
Yes |
No |
No |
|
Client auto-classification |
Yes |
Yes |
No |
No |
|
Intrusion Prevention |
Yes |
Yes |
No |
No |
|
Events, devices and location |
View generated events |
Yes |
Yes |
Yes |
Yes |
Modify generated events |
Yes |
Yes |
Yes |
No |
|
Delete generated events |
Yes |
Yes |
Yes |
No |
|
View devices |
Yes |
Yes |
Yes |
Yes |
|
Add devices (APs, clients, Arista devices) |
Yes |
Yes |
Yes |
No |
|
Modify devices (APs, clients, Arista devices) |
Yes |
Yes |
Yes |
No |
|
Delete devices (APs, clients, Arista devices) |
Yes |
Yes |
Yes |
No |
|
View location |
Yes |
Yes |
Yes |
Yes |
|
Add location |
Yes |
Yes |
Yes |
No |
|
Modify location |
Yes |
Yes |
Yes |
No |
|
Delete location |
Yes |
Yes |
Yes |
No |
|
Calibrate location tracking |
Yes |
Yes |
Yes |
No |
|
Reports |
Add shared report |
Yes (all reports) |
Yes (only self-created reports) |
Yes (only self-created reports) |
No |
Modify shared report |
Yes (all reports) |
Yes (only self-created reports) |
Yes (only self-created reports) |
No |
|
Delete shared report |
Yes (all reports) |
Yes (only self-created reports) |
Yes (only self-created reports) |
No |
|
Generate shared report |
Yes |
Yes |
Yes |
Yes |
|
Schedule shared report |
Yes |
Yes |
Yes |
No |
|
Add custom report |
Yes (only self-created reports) |
Yes (only self-created reports) |
Yes (only self-created reports) |
No |
|
Modify custom report |
Yes (only self-created reports) |
Yes (only self-created reports) |
Yes (only self-created reports) |
No |
|
Delete custom report |
Yes (only self-created reports) |
Yes (only self-created reports) |
Yes (only self-created reports) |
No |
|
Generate custom report |
Yes (only self-created reports) |
Yes (only self-created reports) |
Yes (only self-created reports) |
No |
You can provide Wi-Fi access management or WIPS management features or a combination of Wi-Fi access and WIPS management features on selected location to the user.
The following table lists the privileges applicable to administrator and operator user when you select Wi-Fi access management.
Functionality-wise User Privileges |
|||
Functionality |
Operation |
Administrator |
Operator |
WIPS |
Authorized WLAN Policy |
No |
No |
AP auto-classification |
No |
No |
|
Client auto-classification |
No |
No |
|
Manage Banned Device List |
No |
No |
|
Intrusion Prevention |
No |
No |
|
Intrusion Prevention Activation |
No |
No |
|
Import Devices |
No |
No |
|
Manage WLAN Integration-HP, Aruba, WLC Integration |
No |
No |
|
Manage Device List Locking |
No |
No |
|
Manage Banned Device List |
No |
No |
|
Manage Smart Device Types |
No |
No |
|
Manage Vulnerable SSIDs |
No |
No |
|
Manage Hotspot SSIDs |
No |
No |
|
Wi-Fi Access Management |
Manage Device Template |
Yes |
No |
Manage SSID Profile |
Yes |
No |
|
Manage Network Interfaces |
Yes |
No |
|
Custom Radio Settings through Device Details |
Yes |
No |
|
AP Actions |
Add/Remove from banned List |
No |
No |
Quarantine Device |
No |
No |
|
Change Category |
No |
No |
|
Change Quarantine Status |
No |
No |
|
Mark or unmark as Known/External |
No |
No |
|
Client Actions |
Change group |
No |
No |
Quarantine Device |
No |
No |
|
Add/Remove Device from Banned List |
No |
No |
|
Auto-quarantine |
No |
No |
|
Client fingerprinting |
No |
No |
The following table lists the privileges applicable to administrator and operator user when you select WIPS management.
Functionality-wise User Privileges |
|||
Functionality |
Operation |
Administrator |
Operator |
WIPS |
Authorized WLAN Policy |
Yes |
No |
AP auto-classification |
Yes |
No |
|
Client auto-classification |
Yes |
No |
|
Manage Banned Device List |
Yes |
No |
|
Intrusion Prevention |
Yes |
No |
|
Intrusion Prevention Activation |
Yes |
No |
|
Import Devices |
Yes |
No |
|
Manage WLAN Integration-HP, Aruba, WLC Integration |
Yes |
No |
|
Manage Device List Locking |
Yes |
No |
|
Manage Banned Device List |
Yes |
No |
|
Manage Smart Device Types |
Yes |
No |
|
Manage Vulnerable SSIDs |
Yes |
No |
|
Manage Hotspot SSIDs |
Yes |
No |
|
Wi-Fi Access Management |
Manage Device Template |
No |
No |
Manage SSID Profile |
No |
No |
|
Manage Network Interfaces |
No |
No |
|
Custom Radio Settings through Device Details |
No |
No |
|
AP Actions |
Add/Remove from banned List |
Yes |
Yes |
Quarantine Device |
Yes |
Yes |
|
Change Category |
Yes |
Yes |
|
Change Quarantine Status |
Yes |
Yes |
|
Mark or unmark as Known/External |
Yes
|
Yes |
|
Client Actions |
Change group |
Yes |
Yes |
Quarantine Device |
Yes |
Yes |
|
Add/Remove Device from Banned List |
Yes |
Yes |
|
Auto-quarantine |
Yes |
Yes |
|
Client fingerprinting |
Yes |
Yes |
To assign service privileges for Wireless Manager, perform the following steps.
Arista Packets is a web-based Wi-Fi network troubleshooting tool that reads and analyzes 802.11 wireless packet capture files. It converts the frame-related information in a packet capture file to a graphical form and facilitates easy interpretation of the packet capture.
Arista Packets defines two user roles, User and Viewer.
The following table lists the privileges available to the User and Viewer roles.
Functionality | User | Viewer |
Upload Trace | Yes | No |
Delete Trace | Yes | No |
View Dashboard | Yes | Yes |
View Graph | Yes | Yes |
Create shareable link | Yes | No |
Send feedback | Yes | Yes |
Assign/Unassign Arista Packets specific permissions on Launchpad | Yes | No |
To assign service privileges for Arista Packets, perform the following steps.