Managing Workload Security

You can manage security settings in your environment from the Orchestration CLI and from the UI.

You can work with the following security items:
Access control list
Each access control list assigns security roles to users or groups, in a certain folder.
Security roles
Each role represents a certain level of authorization that defines the set of actions that users or groups can perform on a set of item types.
Folders
Each folder has its own level of authorization that defines the set of actions that users or groups can perform on each folder.
During the startup, HCL Universal Orchestrator creates a FULL_CONTROL standard role, which contains all the permissions for all the resources, and administrative roles are created as well.
Note: The FULL_CONTROL role is read only and cannot be modified or removed using Orchestration CLI or API. If you delete your acl or srol by mistake, you can refer the FULL_CONTROL list to create a new one to restore the required access.
The following table lists all the administrative roles with the related permissions:
Administrative role Permissions
AI_PILOT_ADMINISTRATOR MANAGEAIPILOT
API_KEY_PERSONAL CREATEPERSONALAPIKEY
API_KEY_SERVICE CREATESERVICEAPIKEY
API_KEY_ADMINISTRATOR

DELETEALLAPIKEYS

LISTALLAPIKEYS

DELETE_PLUGIN DELETEPLUGIN
INSTALL_PLUGIN INSTALLPLUGIN
LIST_PLUGIN LISTPLUGIN
REGISTER_AGENT REGISTERAGENT
Security settings can be managed from the Orchestration CLI and the UI. You can find further information in the following topics:
Managing access control list

Managing access control lists from the Orchestration CLI

Managing access control lists from the UI

Managing security roles

Managing security roles from the Orchestration CLI

Managing security roles from the UI