access_policy_register: access_policy_admin
# Lists of all well-known roles and their implications:
#
# Here 'well-known' means that these roles are used either without reference to a resource server,
# or with the reference equal to 'tenant-id'.
#
# Role names starting with exclamation mark (!) are special:
# - if such a name is present in definition of a composite user role whose name coincides with part
# of the special name that follows exclamation mark, this is so-called self-reference role (e.g.,
# !root_admin in definition of root_admin role).
# - if such a name is encountered in list of 'implied access policies for registered entity' of a
# resource server or a client, corresponding composite user role is added to server's/client's
# access token 'as-is', without being expanded to list of its constituent roles.
#
# It looks like these not expanded composite roles are needed to support certain services that only
# check caller's access token for presence of certain composite roles but not their equivalent
# implied roles.
roles:
# user composite roles
root_admin: [ tenant_admin, user_admin, "!root_admin", backup_admin, dr_infra_admin, dr_admin, backup_storage_admin, "agent_manager::admin", "storage_migration::root" ]
partner_admin: [ tenant_admin, user_admin, "!partner_admin", backup_admin, dr_infra_admin, dr_admin, backup_storage_admin, "agent_manager::admin", "storage_migration::admin" ]
company_admin: [ tenant_admin, user_admin, backup_admin, access_policy_admin, "!company_admin", dr_admin, backup_storage_admin, "agent_manager::admin", unit_admin ]
unit_admin: [ tenant_admin, user_admin, backup_admin, "!unit_admin", backup_storage_admin ]
backup_user: [ backup_admin, "!backup_user" ] # bad hacky role, MUST be replaced by normal backup self-service role
# total_protection_admin: [ backup_admin, security_admin ]
backup_admin: [ backup_agent_admin, tenant_viewer, "task_manager::viewer","task_manager::issuer", "credentials_store::owner",
"resource_manager::admin", "policy_manager::admin", "vault_manager::admin", "alert_manager::admin", "storage::readwrite",
"agent_manager::agent_unregistrator", "agent_manager::agent_unregistrar",
"agent_manager::agent_viewer", "apn::requestor", "scan_service::admin",
"agent_manager::host_manager", "index_manager::admin", "!backup_admin",
"credentials_store::admin", "storage::storage_readwrite" ]
# backup_user
# security_admin: [ security_agent_admin ]
backup_agent_admin: [ "oauth2_client_admin(backup_agent)", "resource_manager::admin",
"agent_manager::agent_registrator", "agent_manager::agent_registrar"
]
# security_agent_admin: [ oauth2_client_admin ]
backup_storage_admin: [ "oauth2_client_admin(backup_storage)", infra_admin ]
hci_admin: [ backup_storage_admin ]
dr_admin: [ "oauth2_client_admin(dr)", "dr_service::admin" ]
dr_infra_admin: [ "oauth2_client_admin(dr_infra_admin)", "!dr_infra_admin" ]
# ap_security_agent: []
backup_storage_engine: [ usage_reporter ]
tenant_admin: [ tenant_viewer , "!tenant_admin"] # manage (create, update, delete) tenants, tenant settings (incl branding etc), licenses/quotas in tenant
# atomic roles (set of permissions)
tenant_viewer: [] # read access to tenants
user_admin: [] # manage (create, update, delete) users, user groups and user access policies in tenant
oauth2_client_admin: [] # manage (create, update, delete) OAuth2 clients and associated access policies in tenant
usage_reporter: [] # report (update) usage in tenant
infra_admin: [] # manage (create, update, delete) storage installations in tenant
# legacy roles
storage_readonly: [ "storage::readonly" ]
storage_readwrite: [ "storage::readwrite" ]
storage_replication_master: [ "storage::replication_master" ]
anonymous: [ "oauth2_client_admin(backup_agent)", "oauth2_client_admin(backup_storage)", "!anonymous", "agent_manager::agent_registrator", "agent_manager::agent_registrar" ]
# resource servers defines how (with what access) different services must register and what access policies this services will get in their Access Tokens
# the format is the following:
#
# service_name: <- name of the service
# implied_access_policies_for_registered_entity: <- list of policies that will be implicitly added to any token issued for the service
# - { role: "task_manager::issuer", path: "some_queue" }
# roles: <- list of roles defines with this resource server (in the scope of this resource server)
# role1: [] <- some role
# role2: [service_name::role1] <- some role with implication to the role of the same service
#
resource_servers:
hierarchy_resolver:
roles:
consumer: []
dr_service:
implied_access_policies_for_registered_entity:
- "apn::requestor"
- "credentials_store::owner"
- "oauth2_client_admin(dr)" # to be able to re-register VPN server client when migrating a tenant
- "policy_manager::admin"
- "resource_manager::admin"
- "scheduler::admin"
- "task_manager::trusted_viewer"
- "task_manager:dr-service:consumer"
- "task_manager:dr-service:issuer"
- "task_manager:dr-vpn-service:issuer"
- "task_manager:runvm_delta_create:issuer"
- "task_manager:runvm_delta_delete:issuer"
- "task_manager:runvm_gateway:issuer"
- "task_manager:runvm_vm_create:issuer"
- "task_manager:runvm_vm_delete:issuer"
- "task_manager:runvm_vm_finalize:issuer"
- "vault_manager::admin"
- "tenant_viewer"
- "task_manager:queue_run_vm_to_drc:issuer"
- "task_manager:queue_finalize_vm_in_drc:issuer"
- "task_manager:queue_delete_prepared_for_dr:issuer"
- "task_manager:queue_prepare_for_dr:issuer"
- "task_manager:queue_unmount_vm_in_drc:issuer"
- "task_manager:queue_unmount_vm:issuer"
- "task_manager::viewer"
roles:
admin: [] # manage DR in company
vpn_appliance: [] # role for VPN Appliance
vpn_server: [] # role for VPN Server
runbook_manager:
implied_access_policies_for_registered_entity:
- "task_manager:queue_runbooks:issuer"
- "task_manager:queue_runbooks:consumer"
- "dr_service::admin"
- "task_manager::trusted_viewer"
- "tenant_viewer"
- "task_manager::viewer"
roles:
admin: []
provision_manager:
implied_access_policies_for_registered_entity:
- "task_manager:dr-service:issuer"
- "task_manager:queue_catalog_decommission_tasks:issuer"
- "task_manager:queue_catalog_decommission_tasks:viewer"
- "tenant_viewer"
roles:
admin: []
resource_manager:
implied_access_policies_for_registered_entity:
- "hierarchy_resolver::consumer"
- "task_manager:rm_decommission:consumer"
- "tenant_viewer"
roles:
admin: [] # manage (register, update, unregister) resources, alias for c2c_resource_manager::admin(tenant), computer_resource_manager::admin(tenant)
zmqgw:
implied_access_policies_for_registered_entity:
- "credentials_store::consumer"
- "vault_manager::admin"
- "resource_manager::admin"
- "policy_manager::admin"
- "policy_management::read"
- "task_manager::importer"
- "task_manager::viewer"
- "tenant_viewer"
roles:
admin: []
ams:
implied_access_policies_for_registered_entity:
- "credentials_store::consumer"
- "vault_manager::admin"
- "resource_manager::admin"
- "policy_manager::admin"
- "task_manager::issuer"
- "task_manager::viewer"
- "tenant_admin"
roles:
admin: []
backup_notification_service:
implied_access_policies_for_registered_entity:
- "tenant_viewer"
roles:
admin: []
wb_migration:
implied_access_policies_for_registered_entity:
- "credentials_store::owner"
- "website_backup_manager::admin"
- "tenant_viewer"
roles:
admin: []
task_manager:
implied_access_policies_for_registered_entity:
- "task_manager::cluster_sync"
- "hierarchy_resolver::consumer"
- "tenant_viewer"
roles:
viewer: [] # list tasks (without taking into account which task queues they belongs) in tenant
issuer: [] # push tasks into a specific task queue in tenant
consumer: [] # pop task from a specific task queue in tenant
admin: [] # full access
downstream_sync: [] # accept tasks from downstream Task Manager services
cluster_sync: [] # sync state in a Task Manager cluster
scheduler:
implied_access_policies_for_registered_entity:
- "policy_manager::admin"
- "vault_manager::admin"
- "tenant_viewer"
roles:
admin: []
credentials_store:
implied_access_policies_for_registered_entity:
- "hierarchy_resolver::consumer"
- "task_manager:credentials_decommission:consumer"
- "tenant_viewer"
roles:
admin: [] # access rights to read credentials object metadata (not secret) and add external ids
consumer: [] # full read access plus access to read the credentials object secret
owner: [] # full credentials object management access rights, with the exception of reading the secret
alert_inspector:
implied_access_policies_for_registered_entity:
- "task_manager::issuer"
- "policy_manager::admin"
- "resource_manager::admin"
- "alert_manager::admin"
- "tenant_viewer"
policy_manager:
roles:
admin: []
frs:
roles:
admin: []
corp-wl:
roles:
admin: []
bitdefender-cleanset:
roles:
admin: []
endpoint_protection_manager:
implied_access_policies_for_registered_entity:
- "task_manager:dr_backup_queue:issuer"
- "task_manager:cleanup:issuer"
- "task_manager::trusted_viewer"
- "task_manager::importer"
- "task_manager::issuer"
- "task_manager::consumer"
- "scheduler::admin"
- "vault_manager::admin"
- "resource_manager::admin"
- "policy_manager::admin"
- "alert_manager::admin"
- "oauth2_client_admin(backup_agent)"
- "tenant_viewer"
- "apn::requestor"
backup_policy_manager:
implied_access_policies_for_registered_entity:
- "task_manager:dr_backup_queue:issuer"
- "task_manager:cleanup:issuer"
- "scheduler::admin"
- "vault_manager::admin"
- "resource_manager::admin"
- "policy_manager::admin"
- "tenant_viewer"
virtual_policy_manager:
implied_access_policies_for_registered_entity:
- "task_manager::issuer"
- "scheduler::admin"
- "vault_manager::admin"
- "resource_manager::admin"
eapp_policy_manager:
implied_access_policies_for_registered_entity:
- "task_manager::issuer"
- "scheduler::admin"
- "vault_manager::admin"
- "resource_manager::admin"
archive_policy_manager:
implied_access_policies_for_registered_entity:
- "task_manager::issuer"
- "scheduler::admin"
- "vault_manager::admin"
- "tenant_viewer"
archive_browse_service:
implied_access_policies_for_registered_entity:
- "storage::readonly"
- "notary::admin"
- "tenant_viewer"
c2c_archmgmt_agent:
implied_access_policies_for_registered_entity:
- "storage::readwrite"
- "task_manager:queue_c2c_retention:consumer"
- "task_manager:queue_c2c_migration:consumer"
- "task_manager::trusted_viewer"
- "c2c_backup_manager::admin"
- "vault_manager::admin"
- "tenant_viewer"
o365_c2c_backup_agent:
implied_access_policies_for_registered_entity:
- "storage::readwrite"
- "task_manager:queue_o365_backup:consumer"
- "task_manager:queue_o365_backup_inc:consumer"
- "task_manager:queue_o365_restore:consumer"
- "task_manager:queue_o365_discovery:consumer"
- "task_manager::trusted_viewer"
- "c2c_backup_manager::admin"
- "vault_manager::admin"
- "notary::admin"
- "tenant_viewer"
gsuite_c2c_backup_agent:
implied_access_policies_for_registered_entity:
- "storage::readwrite"
- "task_manager:queue_gsuite_backup:consumer"
- "task_manager:queue_gsuite_backup_inc:consumer"
- "task_manager:queue_gsuite_restore:consumer"
- "task_manager:queue_gsuite_discovery:consumer"
- "task_manager::trusted_viewer"
- "c2c_backup_manager::admin"
- "vault_manager::admin"
- "notary::admin"
- "tenant_viewer"
- "task_manager:queue_gsuite:consumer"
email_archiver:
implied_access_policies_for_registered_entity:
- "storage::readwrite"
- "task_manager:queue_email_archiver_restore:consumer"
- "task_manager::trusted_viewer"
- "c2c_backup_manager::admin"
- "vault_manager::admin"
- "tenant_viewer"
website_c2c_backup_agent:
implied_access_policies_for_registered_entity:
- "storage::readwrite"
- "task_manager:queue_website:consumer"
- "task_manager::trusted_viewer"
- "website_backup_manager::admin"
- "vault_manager::admin"
- "credentials_store::consumer"
- "tenant_viewer"
c2c_backup_manager:
implied_access_policies_for_registered_entity:
- "task_manager::issuer"
- "task_manager:queue_c2c_acc_registration:consumer"
- "task_manager:queue_c2c_protection:consumer"
- "task_manager:queue_c2c_upgrade:consumer"
- "task_manager::trusted_viewer"
- "scheduler::admin"
- "vault_manager::admin"
- "policy_manager::admin"
- "tenant_viewer"
- "credentials_store::owner"
- "credentials_store::consumer"
website_backup_manager:
implied_access_policies_for_registered_entity:
- "task_manager::issuer"
- "task_manager:queue_website_protection:consumer"
- "task_manager::trusted_viewer"
- "scheduler::admin"
- "vault_manager::admin"
- "tenant_viewer"
simple_backup_manager:
implied_access_policies_for_registered_entity:
- "task_manager::issuer"
- "scheduler::admin"
- "vault_manager::admin"
- "tenant_viewer"
protection_status_service:
implied_access_policies_for_registered_entity:
- "policy_manager::admin"
- "resource_manager::admin"
- "alert_manager::admin"
- "tenant_viewer"
vault_manager:
implied_access_policies_for_registered_entity:
- "task_manager::issuer"
- "task_manager:vm_decommission:consumer"
- "scheduler::admin"
- "tenant_viewer"
roles:
admin: []
index_manager:
implied_access_policies_for_registered_entity:
- "task_manager:queue_catalog_indexer_tasks:issuer"
- "task_manager:queue_catalog_indexer_tasks:viewer"
- "task_manager:queue_catalog_indexer_hpriority_tasks:issuer"
- "task_manager:queue_catalog_indexer_hpriority_tasks:viewer"
- "task_manager:queue_catalog_index_tasks:consumer"
- "task_manager:queue_catalog_decommission_tasks:consumer"
- "vault_manager::admin"
- "index_manager_agent::admin"
- "tenant_viewer"
index_manager_agent:
implied_access_policies_for_registered_entity:
- index_manager::registration
- "tenant_viewer"
catalog_manager:
implied_access_policies_for_registered_entity:
- "task_manager:queue_catalog_browser_tasks:issuer"
- "catalog_browser::admin"
- "tenant_viewer"
roles:
admin: []
catalog_browser:
implied_access_policies_for_registered_entity:
- "task_manager:queue_catalog_browser_tasks:consumer"
- "catalog_manager::admin"
- "index_manager::index_operator"
- "tenant_viewer"
catalog_indexer:
implied_access_policies_for_registered_entity:
- "task_manager:queue_catalog_indexer_tasks:consumer"
- "task_manager:queue_catalog_indexer_hpriority_tasks:consumer"
- "credentials_store::consumer"
- "storage::readwrite"
- "tenant_viewer"
- "index_manager::index_operator"
- "index_manager::task_executor"
alert_manager:
implied_access_policies_for_registered_entity:
- "hierarchy_resolver::consumer"
- "tenant_viewer"
roles:
admin: []
storage:
implied_access_policies_for_registered_entity:
roles:
readonly: []
readwrite: []
replication_master: []
apn:
roles:
requestor: []
node: []
agent_manager:
implied_access_policies_for_registered_entity:
- "agent_manager::admin"
- "policy_manager::admin"
- "tenant_viewer"
- "task_manager:ATP_ResourceDiscovery:issuer"
- "task_manager:ATP_RemoteInstall:issuer"
- "task_manager:ATP_CheckCreds:issuer"
- "task_manager:ATP_RegisterHost:issuer"
- "apn::requestor"
roles:
agent_registrator: []
agent_registrar: []
agent_unregistrator: []
agent_unregistrar: []
agent_viewer: []
agent_conn_state_reporter: []
host_manager: []
host_uploader: []
ou_uploader: []
admin: []
agent_gateway:
implied_access_policies_for_registered_entity:
- "agent_manager::agent_conn_state_reporter"
- "tenant_viewer"
stats_server:
implied_access_policies_for_registered_entity:
- "vault_manager::admin"
- "tenant_viewer"
am_eventproc_service:
implied_access_policies_for_registered_entity:
- "task_manager::viewer"
- "vault_manager::admin"
- "resource_manager::admin"
- "policy_manager::admin"
- "alert_manager::admin"
- "tenant_viewer"
am_playbook_service:
implied_access_policies_for_registered_entity:
- "agent_manager::host_manager"
- "task_manager::viewer"
- "vault_manager::admin"
- "resource_manager::admin"
- "policy_manager::admin"
- "alert_manager::admin"
- "task_manager:ATP_FixNowMicrosoft:issuer"
- "task_manager:ATP_FixNowThirdParty:issuer"
- "agent_manager::agent_viewer"
- "tenant_viewer"
- "scan_service::viewer"
- "apn::requestor"
atp_grpm_addon:
implied_access_policies_for_registered_entity:
- "scan_service::admin"
- "policy_manager::admin"
- "vault_manager::admin"
- "tenant_viewer"
alerts_feed_manager:
implied_access_policies_for_registered_entity:
- "resource_manager::admin"
- "policy_manager::admin"
- "alert_manager::admin"
- "task_manager::issuer"
- "tenant_viewer"
scan_service:
implied_access_policies_for_registered_entity:
- "task_manager::admin"
- "vault_manager::admin"
- "hierarchy_resolver::consumer"
- "tenant_viewer"
- "ams::admin"
roles:
agent: []
admin: []
viewer: []
monitoring:
implied_access_policies_for_registered_entity:
roles:
provider: []
viewer: []
admin: []
api_gateway:
implied_access_policies_for_registered_entity:
- "tenant_viewer"
files_protect_service:
implied_access_policies_for_registered_entity:
- "notary::user"
- "tenant_viewer"
storage_migration:
implied_access_policies_for_registered_entity:
roles:
root: []
admin: []
platform_storagemgr:
implied_access_policies_for_registered_entity:
- "storage::readwrite"
- "tenant_viewer"
roles:
storage_addr_requester: []
client_crt_requester: []
agent_resources:
roles:
read: []
cyber_scripting_executor:
roles:
admin: []
atp_agent:
roles:
admin: []
operation: []
av_scanner: []
component_manager: []
notifier: []
policy_manager: []
policy_reader: []
remote_desktop: []
remote_assistance: []
scheduled_notification: []
vapm_info: []
atp_scan_agent:
roles:
admin: []
atp_downloader:
roles:
admin: []
configurator: []
readonly: []
update_controller:
roles:
admin: []
notifier: []
readonly: []
mi_monitoring:
roles:
admin: []
model_manager: []
scheduler: []
sh_inventory:
roles:
admin: []
hwi_scanner: []
swi_scanner: []
hwi_viewer: []
swi_viewer: []
# possible agents that may be registered (installed) which also need their own Access Tokens
clients:
agent_core:
implied_access_policies_for_registered_entity:
- "agent_manager::agent_registrator"
- "agent_manager::agent_registrar"
- "agent_manager::agent_unregistrator"
- "agent_manager::agent_unregistrar"
- "agent_manager::agent_viewer"
- "agent_manager::unit_configuration_viewer"
- "oauth2_client_admin(backup_agent)" # hack for 9.0 summit, to be removed when proper registration token -> jwt exchange is implemented https://pmc.acronis.com/browse/PLTFRM-14881
- "apn::node"
- "agent_resources::read"
allowed_registrators: [ oauth2_client_admin ]
computer_backup_agent:
public_client_id: cf55edc2-02c0-11e8-ba89-0ed5f89f718b # backup agent installer for ABC 7.7
implied_access_policies_for_registered_entity:
- "task_manager::consumer"
- "credentials_store::consumer"
- "storage::readwrite"
- "policy_manager::admin"
- "resource_manager::admin"
- "task_manager:queue1:consumer"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of backup agent in backup management services
mms: # role for mms unit of agent_core
implied_access_policies_for_registered_entity:
- "credentials_store::consumer"
- "credentials_store::owner"
- "policy_manager::admin"
- "resource_manager::admin"
- "storage::readwrite"
- "task_manager::consumer"
- "tenant_viewer"
- "platform_storagemgr::storage_addr_requester"
- "platform_storagemgr::client_crt_requester"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of backup agent in backup management services
respect_barriers: true
backup_storage_engine:
public_client_id: cf55fae2-02c0-11e8-ba89-0ed5f89f718b
implied_access_policies_for_registered_entity:
- backup_storage_engine
allowed_registrators: [ oauth2_client_admin(backup_storage) ] # Registration / deregistration of storage engine in backup management services
vpn-appliance:
public_client_id: cf55fd62-02c0-11e8-ba89-0ed5f89f718b
implied_access_policies_for_registered_entity:
- "!company_admin"
- "task_manager:dr-vpn-service:consumer"
- "dr_service::vpn_appliance"
allowed_registrators: [ oauth2_client_admin(dr) ] # Registration / deregistration of vpn appliance (running on customer side) to enable connectivity with customer primary / recovery servers (running on Acronis cloud side)
vpn-server:
public_client_id: cf560398-02c0-11e8-ba89-0ed5f89f718b # dr deployment system
implied_access_policies_for_registered_entity:
- "!company_admin"
- "task_manager:dr-vpn-service:consumer"
- "dr_service::vpn_server"
allowed_registrators: [ oauth2_client_admin(dr) ] # Registration / deregistration of vpn server (server side for vpn appliance)
dr_backup_agent:
implied_access_policies_for_registered_entity:
- "task_manager:dr_backup_queue:consumer"
- "task_manager:cleanup:consumer"
- "storage::readwrite"
allowed_registrators: [ oauth2_client_admin(dr_infra_admin) ]
run_vm_agent:
implied_access_policies_for_registered_entity:
- "task_manager:runvm_delta_create:consumer"
- "task_manager:runvm_delta_delete:consumer"
- "task_manager:runvm_gateway:consumer"
- "task_manager:runvm_vm_create:consumer"
- "task_manager:runvm_vm_delete:consumer"
- "task_manager:runvm_vm_finalize:consumer"
- "task_manager:dr_backup_queue:consumer"
- "task_manager:cleanup:consumer"
- "credentials_store::consumer"
- "vault_manager::admin"
- "storage::readwrite"
- "agent_resources::read"
allowed_registrators: [ oauth2_client_admin(dr_infra_admin) ] # Registration / deregistration of run vm agent on Acronis cloud side
run_vm_controller:
implied_access_policies_for_registered_entity:
- "credentials_store::consumer"
- "storage::readonly"
allowed_registrators: [ oauth2_client_admin(dr_infra_admin) ]
run_vm_gateway:
allowed_registrators: [ oauth2_client_admin(dr_infra_admin) ]
atp-agent:
implied_access_policies_for_registered_entity:
- "task_manager:ATP_*:consumer"
- "task_manager:ATP_*:issuer"
- "task_manager:SHI_VA:issuer"
- "task_manager:x#ATP_*:consumer"
- "task_manager::trusted_viewer"
- "task_manager:cti.a.p.tm.queue.v1.0~a.swd.deploy.v1.0:consumer"
- "task_manager:cti.a.p.tm.queue.v1.0~a.swd.deploy.v1.0:issuer"
- "agent_manager::host_uploader"
- "agent_manager::ou_uploader"
- "monitoring::provider"
- "scan_service::agent"
- "storage::readwrite"
- "policy_manager::admin"
- "vault_manager::admin"
- "tenant_viewer"
- "credentials_store::consumer"
- "resource_manager::admin"
- "agent_resources::read"
- "atp_downloader::admin"
- "sh_inventory::admin"
- "sh_inventory::swi_scanner"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of atp agent on Acronis cloud side
atp-downloader:
implied_access_policies_for_registered_entity:
- "atp_downloader::admin"
- "atp_agent::vapm_info"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of atp downloader
sync-unit:
implied_access_policies_for_registered_entity:
- "policy_manager::admin"
- "scheduler::admin"
- "agent_resources::read"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of sync unit on Acronis cloud side
# ap_security_agent
backupAgent: # legacy
implied_access_policies_for_registered_entity:
- "task_manager::consumer"
- "storage::readwrite"
- "policy_manager::admin"
- "resource_manager::admin"
- "agent_manager::agent_registrar"
- "oauth2_client_admin(backup_agent)"
- "tenant_viewer"
- "task_manager:queue1:consumer"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of backup agent in backup management services
respect_barriers: true
active_protection:
implied_access_policies_for_registered_entity:
- "alert_manager::admin"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of active_protection on Acronis cloud side
cgw:
implied_access_policies_for_registered_entity:
- "frs::admin"
- "corp-wl::admin"
- "bitdefender-cleanset::admin"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of cgw on Acronis cloud side
cyber-protect-service:
implied_access_policies_for_registered_entity:
- "frs::admin"
- "corp-wl::admin"
- "bitdefender-cleanset::admin"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of cyber-protect-service on Acronis cloud side
task-manager:
implied_access_policies_for_registered_entity:
- "task_manager::delegate"
allowed_registrators: [ oauth2_client_admin(backup_agent) ]
storageNode: # legacy
implied_access_policies_for_registered_entity:
- "credentials_store::consumer"
- "credentials_store::owner"
- "storage::readwrite"
- "tenant_viewer"
allowed_registrators: [ oauth2_client_admin(backup_storage) ]
catalog-browser: # local catalog-browser unit
implied_access_policies_for_registered_entity:
- "task_manager:queue_catalog_browser_tasks:consumer"
- "catalog_manager::admin"
- "index_manager::index_operator"
- "tenant_viewer"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # local catalog-browser unit
credentials-store: # agent-side credentials store unit
allowed_registrators: [ oauth2_client_admin(backup_agent) ]
scheduler-unit:
implied_access_policies_for_registered_entity:
- "atp_agent::scheduled_notification"
- "mi_monitoring::scheduler"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of scheduler
tray-monitor:
implied_access_policies_for_registered_entity:
- "task_manager::viewer"
- "agent_resources::read"
allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of tray-monitor
superset:
allowed_registrators: [ services_registrar ]
device-sense:
implied_access_policies_for_registered_entity:
- "task_manager:cti.a.p.tm.queue.v1.0~a.device_sense.queue_scan.*:consumer"
- "task_manager:cti.a.p.tm.queue.v1.0~a.device_sense.queue_scan.*:viewer"
- "task_manager:cti.a.p.tm.queue.v1.0~a.device_sense.queue_filter.*:consumer"
- "task_manager:cti.a.p.tm.queue.v1.0~a.device_sense.queue_filter.*:viewer"
allowed_registrators: [ oauth2_client_admin(backup_agent), oauth2_client_admin(self) ]
mi-monitoring:
implied_access_policies_for_registered_entity:
- "task_manager::trusted_viewer"
- "task_manager:MI_*:consumer"
- "task_manager:MI_*:issuer"
- "task_manager:CSE_*:issuer"
- "alert_manager::admin"
- "atp_agent::policy_reader"
- "cyber_scripting_executor::admin"
- "policy_management::read"
- "agent_resources::read"
allowed_registrators: [ oauth2_client_admin(backup_agent), oauth2_client_admin(self) ]
update-controller:
implied_access_policies_for_registered_entity:
- "task_manager:x#UpdateFeatureSet:issuer"
- "task_manager:x#UpdateFeatureSet:consumer"
- "task_manager:x#UpdateAgent:consumer"
- "task_manager:x#ATP_RemoteInstall:consumer"
- "task_manager:x#ATP_RegisterHost:consumer"
- "task_manager:ATP_CheckCreds:consumer"
- "task_manager::trusted_viewer"
- "agent_resources::read"
allowed_registrators: [ oauth2_client_admin(backup_agent), oauth2_client_admin(self) ]
sh-inventory: # software and hardware inventory unit
implied_access_policies_for_registered_entity:
- "task_manager:SHI_*:consumer"
- "task_manager::viewer"
- "resource_manager::admin"
- "monitoring::provider"
- "agent_resources::read"
- "atp_agent::notifier"
allowed_registrators: [ oauth2_client_admin(backup_agent), oauth2_client_admin(self) ] |