Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

📙 You will learn

How to create and edit user roles, assigning roles to users or groups, and what each user Role Permission enables.

Prerequisites

Audience: IT Professional or End User
Difficulty: Basic
Time needed: Approximately 5 minutes
Tools required: N/A

The following video provides a brief overview of Roles and Permissions.

Widget Connector
overlayyoutube
_templatecom/atlassian/confluence/extra/widgetconnector/templates/youtube.vm
width600px
urlhttps://www.youtube.com/watch?v=AK0iVFprmcU
height400px

Create New Roles

  1. To edit or create roles, click Global from the Navigation sidebar, then click Identity Management and select the Manage Roles Tab. The only roles shown in a new installation will be Administrator and User. To create a new role, click the Create Role button.

  2. A modal dialog appears with a place to name the new role. In the example. Click on each permission to grant or remove. For limited roles, use the Select None button as a starting point, and grant the desired permissions. Likewise, for a role with broad permissions, use the Select All button, then toggle off the permissions that role should not have. For example a Quality Assurance role, might want to have user and group management disallowed, global system management and other permissions that the QA user won’t need.

    Image RemovedImage Added

  3. To finish, click the Create Role button. The role will appear in the Roles List and a success message displayed.

Editing Roles

  1. To edit a role, first select the role to edit from the Role List. This will expose the Role Details. The Permissions list appears as it did in the creation dialog.

  2. Toggle the preferred permissions to be granted or removed from the role and click the Save Changes button. ThreadFix stores the edited role and displays a success message.

    Image Removed

Assigning Roles to Users or Groups

The Manage Roles tab allows assigning roles to users and/or groups.

  1. Type the name of the user/group in the respective User or Groups field, select the desired user/group, and click the Add User or Add Group button, as applicable.

    Image RemovedImage Added

  2. When all roles have been assigned as desired, click the Save Changes button. ThreadFix stores the edited permission and displays a success message.

Role Permission Details

Below is a summary for the function each Role Permission enables, grouped by category:

Table of contents

toc

Teams and Applications

Create Teams

Allows user to create or delete teams.

Edit Teams

Allows user to edit teams.

Delete Teams

Allows user to delete teams.

Create Applications

Allows user to add applications to teams

Edit Applications

Allows user to edit details and add documents to existing applications. Allows user to change the following properties of the application:

  • URL

    • Unique ID

    • Assigned Team

    • Criticality

    • Application Type

    • Tag

    • Designated Web Application Firewall (WAF)

    • Designated Defect Tracker

    • Vulnerability Merging

Delete Applications

Allows user to delete applications.

Manage Files for Applications

Allows user to add files to applications.

Manage Application Versions

Allows user to create, edit, or delete ThreadFix application versions.

Submit Service Requests

Allows user to create a service request with Denim Group to perform an application scan and audit for an application.

Scans

Manage Scan Agents

Allows user to create and modify configurations for scan agents such as Security AppScan Standard, Burp Suite, and OWASP Zed Attack Proxy. Also allows user to initiate or schedule scans and to modify scans already scheduled.  This role must also be applied Globally for any user whose API key will be used to configure the scanagent.jar.

Upload Scans

Allows user to upload scans from scan agents into ThreadFix for vulnerability tracking and reporting.

Delete Scans

Allows user to delete scans in ThreadFix.

Manage Remote Provider Scans

Allows user to orchestrate Remote Provider scans.

Manage FPR Filter Templates

Allows user to set and delete a global FPR filter template.

Manage Scan Metadata Keys

Allows user to set keys allowed for Scan Metadata.

Manage Scan Metadata

Allows user to set Metadata on Scans.

Manage Pen Test Findings

Allows user to create, edit, and delete Pen Test Findings for any Pen Test Team they belong to.

Manage Pen Tests

Allows user to start or finalize and submit Pen Tests for any Pen Test Teams they belong to.

Delete Pen Tests

Allows user to delete or cancel Pen Tests for any Pen Test Teams they belong to.

Vulnerabilities

Comment on Vulnerabilities

Allows user to submit comments on vulnerabilities.

Attach Documents To Vulnerabilities

Allows user to upload and attach documents to vulnerabilities.

Modify Vulnerabilities

Allows user to close vulnerabilities.

Manage Vulnerability Types

Allows user to create or edit filters for sorting vulnerabilities.

Update Vulnerability Exploitable Status

Allows user to mark or unmark vulnerabilities as exploitable.

Update Vulnerability False Positive Status

Allows user to mark or unmark vulnerabilities as false positives.

Update Vulnerability Contested Status

Allows user to mark or unmark vulnerabilities as contested.

Update Vulnerability Verified Status

Allows user to mark or unmark vulnerabilities as verified.

Tag Vulnerabilities

Allows user to add or remove tags from vulnerabilities.

Defect Trackers

Manage Defect Trackers

Allows user to create new defect tracker configurations or edit existing configurations. This permission is not required to submit vulnerabilities to an application's designated defect tracker. User must have "Manage Applications" permission to designate a defect tracker for an application.

Submit Defects

Allows user to submit bugs to the defect tracker assigned to an application. User must have "Manage Applications" permission to assign a defect tracker to an application.

Manage GRC Tools

Allows user to create and edit Governance, Risk, and Compliance (GRC) Tools.

Reporting

Manage Tags

Allows user to create or edit tags for categorizing applications. User must have "Manage Applications" permission to assign tags to an application.

Generate Reports

Allows user to view graphs and reports summarizing vulnerability information and to export those reports as PDF, PNG, or CSV files.

Generate Report Files

Allows user to export reports.

Manage Email Reports

Allows user to manage and schedule email reports.

Manage Policies

Allows user to create or delete policies and attach them to applications, as well as configure notifications and email alerts that are triggered when a policy’s status changes.

Update Statistics

Allows user to update application, team, and global statistics.

Manage CI/CD

Allows user to access the CI/CD Policies page to manage pass criteria and automated defect reporting.

Administration

Manage Users

Allows user to edit display name, password, role, and permissions for all users. Also allows user to create new user profiles.

Manage API Keys

Allows user to create and manage API keys for interfacing with ThreadFix. This permission applies to managing API keys for other users. All users can create an API key for their own account.

Create API Keys*

Allows user to create their own API keys for interfacing with ThreadFix.

*
  • Introduced in 3.0.8; in earlier versions all users can create their own key.

Manage Roles

Allows user to designate permissions for new roles and to modify the permissions for existing roles.

Manage System Settings

Allows user to modify System Settings for ThreadFix. This includes altering LDAP settings, proxy settings, session timeout, dashboard settings, and customizing displayed reports for the application detail page and the team detail page.

Configure Remote Providers

Allows user to create, modify, and delete Remote Provider configurations for importing scans from SaaS platforms such as QualysGuard WAS, Veracode, and WhiteHat Sentinel.. (In order to access the Remote Providers page, this permission must be granted at the global level.)

Manage Remote Providers

Allows user to perform the balance of functions for existing Remote Provider integrations, e.g., mapping and/or synchronizing applications, importing scans, etc. (In order to access the Remote Providers page, this permission must be granted at the global level.)

Manage Groups

Allows user to create or delete groups of users, and set roles for those groups.

View Error Logs

Allows user to view error logs generated by ThreadFix in the Settings menu. (In order to access the Error Messages page, this permission must be granted at the global level.)

Manage Audit History

Allows user to access the History page to view events for applications the user has permission to access.

Manage Scan Result Filters

Allows user to change severity or suppress scanner vulnerability types.

Manage Custom CWE Text

Allows user to create custom text entries mapped to CWE definitions.

Manage Metadata Keys

Allows user to create, edit, and disable keys allowed for Scan and Application Metadata.

Manage Pen Test Teams

Allows user to create, edit, and delete Pen Test Teams as well as attach Users and Groups to Pen Test Teams.

Queue

Manage Queue

Allows user to cancel queued tasks.

View Queued Items

Allows user to view queued items.

View Processing Queued Items

Allows user to view currently-processing items in the queue.

Infrastructure

Manage Networks

Allows user to create, edit, and delete networks.

Manage Assets

Allows user to create, edit, archive and unarchive network assets.

Delete Assets

Allows user to delete network assets.

Manage Remote Providers

Allows user to create, edit, and delete remote provider configurations to network tools.

Manage Remote Provider Scans

Allows user to create, edit, and delete scheduled scan imports from network remote providers.

Upload Scans

Allows user to upload a scan file from a supported network scanner.

Delete Scans

Allows user to delete existing network scans.

Manage Vulnerabilities

Allows user to edit network vulnerabilities.

View Infrastructure

Allows users to access network infrastructure.

Manage Network Groups

Allows users to edit network groups.

Table of Contents

Table of Contents