VMware Aria Automation
中的組織和服務使用者角色

Automation Assembler
Automation Service Broker
Automation Pipelines
服務定義的組織和服務使用者角色,決定了使用者在每個服務中可以看到的內容和執行的動作。

組織使用者角色

由組織擁有者在
VMware Aria Automation
主控台中為組織定義使用者角色。有兩種類型的角色:組織角色和服務角色。
組織角色是全域性的,將套用至組織中的所有服務。組織層級的角色是「組織擁有者」或「組織成員」角色。
如需有關組織角色的詳細資訊,請參閱《管理 VMware Aria Automation》
在主控台的組織層級上,還會指派屬於服務專屬權限的
Automation Assembler
服務角色。

Assembler Service Roles

The
Automation Assembler
service roles determine what you can see and do in
Automation Assembler
. These service roles are defined in the console by an organization owner.
Automation Assembler
Service Role Descriptions
Role
Description
Assembler Administrator
A user who has read and write access to the entire user interface and API resources. This is the only user role that can see and do everything, including add cloud accounts, create new projects, and assign a project administrator.
Assembler User
A user who does not have the Assembler Administrator role.
In an
Automation Assembler
project, the administrator adds users to projects as project members, administrators, or viewers. The administrator can also add a project administrator.
Assembler Viewer
A user who has read access to see information but cannot create, update, or delete values. This is a read-only role across all projects in all the services.
Users with the viewer role can see all the information that is available to the administrator. They cannot take any action unless you make them a project administrator or a project member. If the user is affiliated with a project, they have the permissions related to the role. The project viewer would not extend their permissions the way that the administrator or member role does.
In addition to the service roles,
Automation Assembler
has project roles. Any project is available in all of the services.
The project roles are defined in
Automation Assembler
and can vary between projects.
In the following tables, which tells you what the different service and project roles can see and do, remember that the service administrators have full permission on all areas of the user interface.
The descriptions of project roles will help you decide what permissions to give your users.
  • Project administrators leverage the infrastructure that is created by the service administrator to ensure that their project members have the resources they need for their development work.
  • Project members work within their projects to design and deploy cloud templates. Your projects can include only resources that you own or resources that are shared with other project members.
  • Project viewers are restricted to read-only access, except in a few cases where they can do non-destructive things like download cloud templates.
  • Project supervisors are approvers in
    Automation Service Broker
    for their projects where an approval policy is defined with a project supervisor approver. To provide the supervisor with context for approvals, consider also granting them the project member or viewer role.
Automation Assembler
service roles and project roles
UI Context
Task
Assembler Administrator
Assembler Viewer
Assembler User
User must be a project administrator or member to see and do project-related tasks.
Project Administrator
Project Member
Project Viewer
Project Supervisor
Access Assembler
Console
In the Automation console, you can see and open Assembler
Yes
Yes
Yes
Yes
Yes
Yes
Infrastructure
See and open the Infrastructure tab
Yes
Yes
Yes
Yes
Yes
Yes
Administration - Projects
Create projects
Yes
Update, or delete values from project summary, provisioning, Kubernetes, integrations, and test project configurations.
Yes
Add users and groups, and assign roles in projects.
Yes
Yes. Your projects.
View projects
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Yes. Your projects
Administration - Users and Groups
View the users and groups assigned to custom roles.
Yes
Administration - Custom Roles
Create custom user roles and assign them to users and groups.
Yes
Administration - Custom Names
Create custom resource names.
Yes
Administration - Secrets
Create and delete secret reusable properties.
Yes
Administration - Settings
Turn on or off internal settings.
Yes
Configure - Cloud Zones
Create, update, or delete cloud zones
Yes
View cloud zones
Yes
Yes
View cloud zone Insights dashboard
Yes
Yes
View cloud zones alerts
Yes
Yes
Configure - Kubernetes Zones
Create, update, or delete Kubernetes zones
Yes
View Kubernetes zones
Yes
Yes
Configure - Flavors
Create, update, or delete flavors
Yes
View flavors
Yes
Yes
Configure - Image Mappings
Create, update, or delete image mappings
Yes
View image mappings
Yes
Yes
Configure - Network Profiles
Create, update, or delete network profiles
Yes
View image network profiles
Yes
Yes
Configure - Storage Profiles
Create, update, or delete storage profiles
Yes
View image storage profiles
Yes
Yes
Configure - Pricing Cards
Create, update, or delete pricing cards
Yes
View the pricing cards
Yes
Yes
Configure - Tags
Create, update, or delete tags
Yes
View tags
Yes
Yes
Resources - Compute
Add tags to discovered compute resources
Yes
View discovered compute resources
Yes
Yes
Resources - Networks
Modify network tags, IP ranges, IP addresses
Yes
View discovered network resources
Yes
Yes
Resources - Security
Add tags to discovered security groups
Yes
View discovered security groups
Yes
Yes
Resources - Storage
Add tags to discovered storage
Yes
View storage
Yes
Yes
Resources - Kubernetes
Deploy or add Kubernetes clusters, and create or add namespaces
Yes
View Kubernetes clusters and namespaces
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Activity - Requests
Delete deployment request records
Yes
View deployment request records
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Activity - Event Logs
View event logs
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Connections - Cloud Accounts
Create, update, or delete cloud accounts
Yes
View cloud accounts
Yes
Yes
Connections - Integrations
Create, update, or delete integrations
Yes
View integrations
Yes
Yes
Onboarding
Create, update, or delete onboarding plans
Yes
View onboarding plans
Yes
Yes. Your projects
Extensibility
See and open the Extensibility tab
Yes
Yes
Yes
Events
View extensibility events
Yes
Yes
Subscriptions
Create, update, or delete extensibility subscriptions
Yes
Deactivate subscriptions
Yes
View subscriptions
Yes
Yes
Library - Event topics
View event topics
Yes
Yes
Library - Actions
Create, update, or delete extensibility actions
Yes
View extensibility actions
Yes
Yes
Library - Workflows
View extensibility workflows
Yes
Yes
Activity - Action Runs
Cancel or delete extensibility action runs
Yes
View extensibility action runs
Yes
Yes
Yes. Your projects
Activity - Workflow Runs
View extensibility workflow runs
Yes
Yes
Design
Design
Open the Design tab
Yes
Yes
Yes.
Yes.
Yes.
Yes
Cloud Templates
Create, update, and delete cloud templates
Yes
Yes. Your projects
Yes. Your projects
View cloud templates
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Download cloud templates
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Upload cloud templates
Yes
Yes. Your projects
Yes. Your projects
Deploy cloud templates
Yes
Yes. Your projects
Yes. Your projects
Version and restore cloud templates
Yes
Yes. Your projects
Yes. Your projects
Release cloud templates to the catalog
Yes
Yes. Your projects
Yes. Your projects
Custom Resources
Create, update or delete custom resources
Yes
View custom resources
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Custom Actions
Create, update, or delete custom actions
Yes
View custom actions
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Resources
See and open the Resources tab
Yes
Yes
Yes
Yes
Yes
Yes
Deployments
View deployments including deployment details, deployment history, price, monitor, alerts, optimize, and troubleshooting information
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Manage alerts
Yes
Yes. Your projects
Yes. your projects
Run day 2 actions on deployments based on policies
Yes
Yes. Your projects
Yes. Your projects
Resources - All Resources
View all discovered resources
Yes
Yes
Run day 2 actions on discovered resources.
Actions available only on machines and limited to power on and off for all machines, and remote console for vSphere machines.
Yes
Resources - All Resources
View deployed, onboarded, migrated resources
Yes
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
Run Day 2 actions on deployed, onboarded, and migrated resources based on policies
Yes
Yes
Yes. Your projects.
Yes. Your projects.
Resources - Virtual Machines
View discovered machines
Yes
Yes
Run day 2 actions on discovered machines.
Actions are limited to power on and off, and remote console for vSphere machines.
Yes
Create New VM
This option is available to administrators. However, if an administrator turns on the setting, then it is available to the other users roles. To activate the option, select
Infrastructure
Administration
Settings
and turn on
Create new resource
.
By activating the option,
Automation Service Broker
users can create VMs based on any image and any flavor even though they are not administrators themselves. To avoid the potential overconsumption of resources, administrators can create approval policies to reject or approve any deployment requests based on the image used or the flavor or size requested.
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
View deployed, onboarded, and migrated resources.
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
Run day 2 actions on deployed, onboarded, and migrated resources based on policies
Yes
Yes. Your projects.
Yes. Your projects.
Resources - Volumes
View discovered volumes
Yes
Yes
No day 2 actions available
View deployed, onboarded, and migrated volumes
Yes
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
Run day 2 actions on deployed, onboarded, and migrated volumes based on policies
Yes
Yes. Your projects.
Yes. Your projects.
Resources - Networkin and Security
View discovered networks, load balancers, and security groups
Yes
Yes
No day 2 actions available
View deployed, onboarded, and migrated networks, load balancers, and security groups
Yes
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
Run day 2 actions on deployed, onboarded, and migrated networks, load balancers, and security groups based on policies
Yes
Yes. Your projects.
Yes. Your projects.
Alerts
See and open the Alerts tab
Yes
Yes
Yes
Yes
Yes
Manage alerts
Yes
Yes. Your projects
Yes. Your projects
View alerts
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects

Service Broker Service Roles

The
Automation Service Broker
service roles determine what you can see and do in
Automation Service Broker
. These service roles are defined in the console by an organization owner.
Service Broker Service Role Descriptions
Role
Description
Service Broker Administrator
Must have read and write access to the entire user interface and API resources. This is the only user role that can perform all tasks, including creating a new project and assigning a project administrator.
Service Broker User
Any user who does not have the
Automation Service Broker
Administrator role.
In an
Automation Service Broker
project, the administrator adds users to projects as project members, administrators, or viewers. The administrator can also add a project administrator.
Service Broker Viewer
A user who has read access to see information but cannot create, update, or delete values. This is a read-only role across all projects in all the services.
Users with the viewer role can see all the information that is available to the administrator. They cannot take any action unless you make them a project administrator or a project member. If the user is affiliated with a project, they have the permissions related to the role. The project viewer would not extend their permissions the way that the administrator or member role does.
In addition to the service roles,
Automation Service Broker
has project roles. Any project is available in all of the services.
The project roles are defined in
Automation Service Broker
and can vary between projects.
In the following tables, which tells you what the different service and project roles can see and do, remember that the service administrators have full permission on all areas of the user interface.
Use the following descriptions of project roles will help you as you decide what permissions to give your users.
  • Project administrators leverage the infrastructure that is created by the service administrator to ensure that their project members have the resources they need for their development work.
  • Project members work within their projects to design and deploy cloud templates. In the following table, Your projects can include only resources that you own or resources that are shared with other project members.
  • Project viewers are restricted to read-only access.
  • Project supervisors are approvers in
    Automation Service Broker
    for their projects where an approval policy is defined with a project supervisor approver. To provide the supervisor with context for approvals, consider also granting them the project member or viewer role.
Service Broker Service Roles and Project Roles
UI Context
Task
Service Broker Administrator
Service Broker Viewer
Service Broker User
User must be a project administrator to see and do project-related tasks.
Project Administrator
Project Member
Project Viewer
Project Supervisor
Access Service Broker
Console
In the console, you can see and open Service Broker
Yes
Yes
Yes
Yes
Yes
Yes
Infrastructure
See and open the Infrastructure tab
Yes
Yes
Administration - Projects
Create projects
Yes
Update, or delete values from project summary, provisioning, Kubernetes, integrations, and test project configurations.
Yes
Add users and groups, and assign roles in projects.
Yes
Yes. Your projects.
View projects
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Administration - Custom Roles
Create custom user roles and assign them to users and groups.
Yes
Administration - Custom Names
Create custom resource names.
Yes
Administration - Secrets
Create and delete secret reusable properties.
Yes
Administration - Settings
Turn on or off internal settings.
Yes
Administration - Users and Groups
View the users and groups assigned to custom roles.
Yes
Configure - Cloud Zones
Create, update, or delete cloud zones
Yes
View cloud zones
Yes
Yes
Configure - Kubernetes Zones
Create, update, or delete Kubernetes zones
Yes
View Kubernetes zones
Yes
Yes
Connections - Cloud Accounts
Create, update, or delete cloud accounts
Yes
View cloud accounts
Yes
Yes
Connections - Integrations
Create, update, or delete integrations
Yes
View integrations
Yes
Yes
Activity - Requests
Delete deployment request records
Yes
View deployment request records
Yes
Activity - Event Logs
View event logs
Yes
Content and Policies
See and open the Content and Policies tab
Yes
Yes
Content Sources
Create, update, or delete content sources
Yes
View content sources
Yes
Yes
Content
Customize form and configure item
Yes
View content
Yes
Yes
Policies - Definitions
Create, update, or delete policy definitions
Yes
View policy definitions
Yes
Yes
Policies - Enforcement
View enforcement log
Yes
Yes
Notifications - Email Server
Configure an email server
Yes
Consume
See and open the Consume tab
Yes
Yes
Yes
Yes
Yes
Yes
Projects
See and search projects
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Yes. Your projects
Yes. Your projects
Catalog
See and open the Catalog page
Yes
Yes
Yes
Yes
Yes
Yes
View available catalog items
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Request a catalog item
Yes
Yes. Your projects
Yes. Your projects
Deployments - Deployments
View deployments, including deployment details, deployment history, price, monitor, alerts, optimize, and troubleshooting information
Yes
Yes
Yes. Your projects
Yes. Your projects
Yes. Your projects
Manage alerts
Yes
Yes. Your projects
Yes. Your projects
Run day 2 actions on deployments based on policies
Yes
Yes. Your projects
Yes. Your projects
Deployments - Resources
View all discovered resources
Yes
Yes
Run day 2 actions on discovered resources.
Actions available only on machines and limited to power on and off for all machines, and remote console for vSphere machines.
Yes
Deployments - All Resources
View deployed, onboarded, migrated resources
Yes
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
Run Day 2 actions on deployed, onboarded, and migrated resources based on policies
Yes
Yes
Yes. Your projects.
Yes. Your projects.
Deployments - Virtual Machines
View discovered machines
Yes
Yes
Run day 2 actions on discovered machines.
Actions are limited to power on and off, and remote console for vSphere machines.
Yes
Create New VM
This option is available in
Automation Service Broker
if your administrator activates the option. To activate the option, select
Infrastructure
Administration
Settings
.
By activating the option,
Automation Service Broker
users can create VMs based on any image and any flavor even though they are not administrators themselves. To avoid the potential overconsumption of resources, administrators can create approval policies to reject or approve any deployment requests based on the image used or the flavor or size requested.
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
View deployed, onboarded, and migrated resources.
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
Run day 2 actions on deployed, onboarded, and migrated resources based on policies
Yes
Yes. Your projects.
Yes. Your projects.
Deployments - Volumes
View discovered volumes
Yes
Yes
No day 2 actions available
View deployed, onboarded, and migrated volumes
Yes
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
Run day 2 actions on deployed, onboarded, and migrated volumes based on policies
Yes
Yes. Your projects.
Yes. Your projects.
Deployments - Networking and Security
View discovered networks, load balancers, and security groups
Yes
Yes
No day 2 actions available
View deployed, onboarded, and migrated networks, load balancers, and security groups
Yes
Yes
Yes. Your projects.
Yes. Your projects.
Yes. Your projects.
Run day 2 actions on deployed, onboarded, and migrated networks, load balancers, and security groups based on policies
Yes
Yes. Your projects.
Yes. Your projects.
Inbox
See and open the Inbox tab
Yes
Yes
Approvals
View approval requests
Yes
Yes
Yes
Yes
Yes
Yes
Respond to approval requests
Yes
Yes. Your projects and the policy approver is Project Administrator
Only if you are a named approver
Only if you are a named approver
Yes. Your projects and the policy approver is Project Supervisor
User Input Requests
View user input requests
Yes
Yes
Yes
Yes
Respond to user input requests
Yes
Yes. Your projects and you are assigned to provide input
Only if you are assigned to provide input

Pipelines 服務角色

Automation Pipelines
服務角色決定了您可以在
Automation Pipelines
中看到和執行什麼。這些角色由組織擁有者在主控台中定義。在所有服務中均可使用任何專案。
Pipelines 服務角色說明
角色
說明
Pipelines 管理員
具有整個使用者介面和 API 資源的讀取和寫入權限的使用者。這是唯一可查看和執行所有操作的使用者角色,包括建立專案、整合端點、新增觸發器、建立管線和自訂儀表板、將端點和變數標記為受限制的資源、執行使用受限制資源的管線,以及請求在
Automation Service Broker
中發佈管線。
Pipelines 開發人員
可使用管線但無法使用受限制端點或變數的使用者。如果管線包含受限制的端點或變數,則此使用者必須取得對使用受限制端點或變數之管線工作的核准。
Pipelines 執行者
可以執行管線並核准或拒絕使用者作業工作的使用者。該使用者可以繼續、暫停和取消管線執行,但無法修改管線。
Pipelines 使用者
可存取
Automation Pipelines
但在
Automation Pipelines
中不具有任何其他權限的使用者。
Pipelines 檢視者
具有讀取存取權的使用者,可查看管線、端點、管線執行和儀表板,但無法進行建立、更新或刪除。同時具有服務檢視者角色的使用者可以查看可供管理員使用的所有資訊。這些使用者無法執行任何動作,除非您將其設為專案管理員或專案成員。如果使用者與某個專案相關聯,便擁有與角色相關的權限。專案檢視者不會按照管理員或成員角色的方式來延伸其權限。
除了服務角色以外,
Automation Pipelines
還具有專案角色。在所有服務中均可使用任何專案。
專案角色是在
Automation Pipelines
中定義的,可能會因專案而異。
在以下說明不同的服務和專案角色可以查看和執行哪些動作的資料表中,請記住,服務管理員對使用者介面的所有區域擁有完整權限。
使用下列專案角色說明以協助您決定授與使用者哪些權限。
  • 專案管理員利用服務管理員所建立的基礎結構,來確保其專案成員具有其開發工作所需的資源。專案管理員可以新增成員。
  • 具有服務角色的專案成員可使用服務。
  • 專案檢視者可查看專案,但無法建立、更新或刪除專案。
除受限制以外的所有動作
表示此角色有權對實體執行建立、讀取、更新和刪除動作,但受限制的變數和端點除外。
Automation Pipelines
服務角色功能
UI 內容
功能
Automation Pipelines
管理員角色
Automation Pipelines
開發人員角色
Automation Pipelines
執行者角色
Automation Pipelines
檢視者角色
Automation Pipelines
使用者角色
管線
檢視管線
建立管線
執行管線
執行包含受限制端點或變數的管線
更新管線
刪除管線
管線執行
檢視管線執行
繼續、暫停和取消管線執行
恢復為獲得對受限制資源的核准而停止的管線
自訂整合
建立自訂整合
讀取自訂整合
更新自訂整合
端點
檢視執行
建立執行
更新執行
刪除執行
將資源標記為受限制
將端點或變數標記為受限制
儀表板
檢視儀表板
建立儀表板
更新儀表板
刪除儀表板

Assembler Migration Assistant Service Roles

The Migration Assistant service roles determine what you can see and do in Migration Assistant and Assembler. These service roles are defined in the console by an organization owner.
Assembler Migration Assistant Service Roles Descriptions
Role
Description
Migration Assistant Administrator
A user who has full view, update, and delete privileges in the Migration Assistant and Assembler.
This role must also have at least the Assembler Viewer role.
Migration Assistant Viewer
A user who has read access to see information but cannot create, update, or delete values in Migration Assistant or in Assembler.
This role must also have at least the Assembler Viewer role.

Orchestrator Service Roles

The
Automation Orchestrator 用戶端
service roles determine what you can see and do in
Automation Orchestrator 用戶端
. These service roles are defined in the console by an organization owner.
Automation Orchestrator Service Roles Descriptions
Role
Description
Orchestrator Administrator
A user who has full view, update, and delete privileges in
Automation Orchestrator 用戶端
. An administrator can also access the content created by specific groups.
Orchestrator Viewer
A user who has read access to see features and content, including all groups and group content, but cannot create, update, run, delete values, or export content. This is a read-only role across all projects in all the services.
Orchestrator Workflow Designer
A user who can create, run, edit, and delete their own
Automation Orchestrator 用戶端
content. They can add their own content to their assigned group. The workflow designer does not have access to the administration and troubleshooting features of the
Automation Orchestrator 用戶端
.
Automation users without an assigned Orchestrator service role can still access all
Automation Orchestrator 用戶端
instances in the organization but have limited permissions. They can view and run their own content and respond to user interaction requests that are assigned to them.
Users without an assigned Orchestrator service role in Automation who have an assigned role in an individual
Automation Orchestrator 用戶端
instance can only access that
Automation Orchestrator 用戶端
instance.

Automation Config Service Role

The Automation Config service role determines what you can see and do in Automation. This service role is defined in the console by an organization owner.
Automation Config Service Role Description
Role
Description
Config Administrator
A user who can access the Automation Config tile on the console when the integration with Assembler is configured. To log in on the Automation Config instance, the user must have Automation Config administrator permissions that are defined in Automation Config.
The user must also have the Assembler Administrator role.
Config User
A user who does not have the Config Administrator role.
Salt Master
Config Superuser