Roles
Last updated
Last updated
Copyright © Keepnet Labs LTD. All rights reserved.
This section describes how to create custom roles to restrict platform access usage for system users. The platform provides default roles such as Company Admin and Reseller for system users to use on the platform. The admin has the option to restrict system users’ activities on the platform.
Go to Company > System Users > Roles menu. This menu will list all the default roles and custom roles. The admin can create, view, edit or delete the roles.
The fields of the roles page are explained below.
Go to Company Settings > System Users > Roles then click the New button. This will bring you to the page where you will define the role name, descriptions, and permissions with the following fields.
For each permission, you can select the full field or specific sub-fields within the permission to the platform.
Once you select the permissions for your new role, click Save button and the new role will populate on the Roles page.
Go to the Company > System Users page to assign the custom role to the system users, simply by editing the system users and updating the role. The system user will have a custom role and depending on the custom role permissions, the system user can manage the platform.
Role Name
Name of the role
Users
Number of users assigned to the role
Type
The type of the custom role, it can be Custom or System. The Custom is created by the company and the System is provided by the Platform or Reseller.
Date Created
The date that the role was first created
Actions > Edit
Edit the role to customize
Action > Delete
Delete the role. The users must be unassigned from this role for an admin to delete the role successfully.
Role Title
The name of the custom role
Description
A brief description of the role
Make available For
Choose the companies and/or company groups that will have this role available. This option is only available to Reseller accounts.
Privileges
Search permissions to assign to the role.
Permissions
Select the permissions to make available. You can see the permissions available in the table below.
Permission Field
Sub Field(s)
Threat Sharing
Communities
Incidents
Phishing Simulation
Email Templates
DNS Services
Domain Records
Landing Page
Templates
Phishing Scenario
Phishing Campaign
Phishing Campaign Job
Phishing Campaign Report
Exclude IP Address
Smishing Simulator
Smishing Scenario
Text Template
Smishing Campaign
Smishing Campaign Job
Smishing Campaign Report
Smishing Domain Records
Smishing Exclude IP Address
Smishing Dns Services
Smishing Landing Page Template
Awareness Educator
Certificates
Enrollments
Training List
Training Reports
Incident Responder
Integrations
Cross Company Integration
Investigations
Incident Responder
Reported Emails
Playbook
Mail Configurations
Phishing Reporter Add in
Phishing Reporter
Settings
User
Email Threat Simulator
Attack Vector
Quick Scan
Company Settings
Audit Log
Companies
Widget
ROI Settings
Company Groups
System Users
User Roles
People
Account
Target Users
Company Settings
SMTP Settings
Notification Templates
Rest API
White Labeling
Proxy Settings
SAML Settings
Tag Management
Company Settings
SCIM
SIEM Integrations
LDAP Settings
Allow List
Direct Email Creation
Privacy
Vishing Simulator
Vishing Template
Vishing Campaign
Quishing Simulator
Quishing Scenario
Quishing Domain Records
Quishing Exclude IP Address
Quishing Dns Services
Quishing Landing Page Template
Quishing Campaign
Quishing Campaign Job
Quishing Campaign Report
Email Templates
Quishing Template
Threat Intelligence
Search Leak
Get Leak Report
Callback Simulator
Callback Template
Callback EmailTemplate
Callback Scenario
Callback Campaign
Callback Campaign Job
Callback Settings
Callback Campaign Job Report