As we reach the end of September 2024, ThreadFix version 3.x on-premises has officially reached its End-of-Life. Therefore, there is no longer support or updates for this version of the product. We have fully transitioned our product and development teams to focus ThreadFix SaaS and migrating all customers over from the on-premises versions. Our Customer Success and Support teams are here to help you in migrating to ThreadFix SaaS and maximizing the value you see from this improved offering from Coalfire. This is the next phase of ThreadFix and our team is looking forward to continuing to support you on this journey.

Manage Roles 3.X

You will learn

How to create and edit user roles, assigning roles to users or groups, and what each user Role Permission enables.

Prerequisites

Audience: IT Professional or End User
Difficulty: Basic
Time needed: Approximately 5 minutes
Tools required: N/A

The following video provides a brief overview of Roles and Permissions.

 

Roles are pre-defined permission sets, used to authorize user actions in the ThreadFix system. ThreadFix comes with two built-in roles, User and Administrator.

  • The User role, by default, is granted no specific permissions. However, any user/group that is granted this (or any other) role at the global/team/application level will have at least read access from that level downward. I.e., at minimum, they'll be able to view vulnerability details from the allocated level downward, plus whatever other permissions you enable for the role.

  • The default Administrator role has permissions for all actions in the system. (Note: For default LDAP/SAML role information, see here)

There are also two constants in the system, which, although not technically roles, appear in the Global Role dropdowns on both the User Details and Group Details pages. These are No Global Access and Read Access. These constants can be applied to a user to block them from actions in the system or provide read-only access to the system.

In a single-user or small-team environment, users can start working within ThreadFix right away. This is because the default account for a new installation has the Administrator role already. This is why it is important to replace the installation account with your own, with the Administrator role.

In a larger enterprise environment, an administrator can leverage Roles and Groups to create a fine-grained permissions model for their vulnerability management effort.

  • Users/groups without any global, team, nor application role at all can only authenticate to the system.

  • Permissions in ThreadFix are additive, so the highest-level permission granted to a user applies to all functions a user might access in ThreadFix. This grants the ThreadFix administrator a remarkable degree of flexibility in the authorization of users for specific tasks. This should be kept in mind when defining roles and groups.

Create New Roles

  1. To edit or create roles, click Global from the Navigation sidebar, then click Identity Management and select the Manage Roles Tab. The only roles shown in a new installation will be Administrator and User. To create a new role, click the Create Role button.

     

  2. A modal dialog appears with a place to name the new role. In the example. Click on each permission to grant or remove. For limited roles, use the Select None button as a starting point, and grant the desired permissions. Likewise, for a role with broad permissions, use the Select All button, then toggle off the permissions that role should not have. For example a Quality Assurance role, might want to have user and group management disallowed, global system management and other permissions that the QA user won’t need.

     

  3. To finish, click the Create Role button. The role will appear in the Roles List and a success message displayed.

Editing Roles

  1. To edit a role, first select the role to edit from the Role List. This will expose the Role Details. The Permissions list appears as it did in the creation dialog.

     

  2. Toggle the preferred permissions to be granted or removed from the role and click the Save Changes button. ThreadFix stores the edited role and displays a success message.

Assigning Roles to Users or Groups

The Manage Roles tab allows assigning roles to users and/or groups.

  1. Type the name of the user/group in the respective User or Groups field, select the desired user/group, and click the Add User or Add Group button, as applicable.

     

  2. When all roles have been assigned as desired, click the Save Changes button. ThreadFix stores the edited permission and displays a success message.

Role Permission Details

Below is a summary for the function each Role Permission enables, grouped by category:

Teams and Applications

Teams and Applications

Create Teams

Allows user to create or delete teams.

Edit Teams

Allows user to edit teams.

Delete Teams

Allows user to delete teams.

Create Applications

Allows user to add applications to teams

Edit Applications

Allows user to edit details and add documents to existing applications. Allows user to change the following properties of the application:

  • URL

    • Unique ID

    • Assigned Team

    • Criticality

    • Application Type

    • Tag

    • Designated Web Application Firewall (WAF)

    • Designated Defect Tracker

    • Vulnerability Merging

Delete Applications

Allows user to delete applications.

Manage Files for Applications

Allows user to add files to applications.

Manage Application Versions

Allows user to create, edit, or delete ThreadFix application versions.

Submit Service Requests

Allows user to create a service request with Denim Group to perform an application scan and audit for an application.

Scans

Scans

Manage Scan Agents

Allows user to create and modify configurations for scan agents such as Security AppScan Standard, Burp Suite, and OWASP Zed Attack Proxy. Also allows user to initiate or schedule scans and to modify scans already scheduled.  This role must also be applied Globally for any user whose API key will be used to configure the scanagent.jar.

Upload Scans

Allows user to upload scans from scan agents into ThreadFix for vulnerability tracking and reporting.

Delete Scans

Allows user to delete scans in ThreadFix.

Manage Remote Provider Scans

Allows user to orchestrate Remote Provider scans.

Manage FPR Filter Templates

Allows user to set and delete a global FPR filter template.

Manage Scan Metadata Keys

Allows user to set keys allowed for Scan Metadata.

Manage Scan Metadata

Allows user to set Metadata on Scans.

Manage Pen Test Findings

Allows user to create, edit, and delete Pen Test Findings for any Pen Test Team they belong to.

Manage Pen Tests

Allows user to start or finalize and submit Pen Tests for any Pen Test Teams they belong to.

Delete Pen Tests

Allows user to delete or cancel Pen Tests for any Pen Test Teams they belong to.

Vulnerabilities

Vulnerabilities

Comment on Vulnerabilities

Allows user to submit comments on vulnerabilities.

Attach Documents To Vulnerabilities

Allows user to upload and attach documents to vulnerabilities.

Modify Vulnerabilities

Allows user to close vulnerabilities.

Manage Vulnerability Types

Allows user to create or edit filters for sorting vulnerabilities.

Update Vulnerability Exploitable Status

Allows user to mark or unmark vulnerabilities as exploitable.

Update Vulnerability False Positive Status

Allows user to mark or unmark vulnerabilities as false positives.

Update Vulnerability Contested Status

Allows user to mark or unmark vulnerabilities as contested.

Update Vulnerability Verified Status

Allows user to mark or unmark vulnerabilities as verified.

Tag Vulnerabilities

Allows user to add or remove tags from vulnerabilities.

Defect Trackers

Defect Trackers

Manage Defect Trackers

Allows user to create new defect tracker configurations or edit existing configurations. This permission is not required to submit vulnerabilities to an application's designated defect tracker. User must have "Manage Applications" permission to designate a defect tracker for an application.

Submit Defects

Allows user to submit bugs to the defect tracker assigned to an application. User must have "Manage Applications" permission to assign a defect tracker to an application.

Manage GRC Tools

Allows user to create and edit Governance, Risk, and Compliance (GRC) Tools.

Reporting

Reporting

Manage Tags

Allows user to create or edit tags for categorizing applications. User must have "Manage Applications" permission to assign tags to an application.

Generate Reports

Allows user to view graphs and reports summarizing vulnerability information and to export those reports as PDF, PNG, or CSV files.

Generate Report Files

Allows user to export reports.

Manage Email Reports

Allows user to manage and schedule email reports.

Manage Policies

Allows user to create or delete policies and attach them to applications, as well as configure notifications and email alerts that are triggered when a policy’s status changes.

Requires a user to have Global Read Access at a minimum to manage policies on the following pages:

  • Application Details Page

  • Policies Page

  • Tag Details Page

  • Team Details Page

Update Statistics

Allows user to update application, team, and global statistics.

Manage CI/CD

Allows user to access the CI/CD Policies page to manage pass criteria and automated defect reporting.

  • If a user has the Manage Policies permission and Manage CI/CD permission, they will be able to see the Filter Policies, Pass Criteria, Defect Reporters, and Time to Remediate Policies tabs

  • If a user has the Manage Policies permission but NOT Manage CI/CD permission, they will only be able to see the Time to Remediate Policies tab

  • If the user only has Manage CI/CD permission but not Manage Policies permission then they have no access to manage policies at all

  • In order to see Pass Criteria, Defect Reporters tab they should have both Manage CI/CD permission and Manage Policies permission in that case they see  all four tabs.

Administration

Administration

Manage Users

Allows user to edit display name, password, role, and permissions for all users. Also allows user to create new user profiles.

Manage API Keys

Allows user to create and manage API keys for interfacing with ThreadFix. This permission applies to managing API keys for other users. All users can create an API key for their own account.

Create API Keys*

Allows user to create their own API keys for interfacing with ThreadFix.

  • Introduced in 3.0.8; in earlier versions all users can create their own key.

Manage Roles

Allows user to designate permissions for new roles and to modify the permissions for existing roles.

Manage System Settings

Allows user to modify System Settings for ThreadFix. This includes altering LDAP settings, proxy settings, session timeout, dashboard settings, and customizing displayed reports for the application detail page and the team detail page.

Configure Remote Providers

Allows user to create, modify, and delete Remote Provider configurations for importing scans from SaaS platforms such as QualysGuard WAS, Veracode, and WhiteHat Sentinel.. (In order to access the Remote Providers page, this permission must be granted at the global level.)

Manage Remote Providers

 

Allows user to perform the balance of functions for existing Remote Provider integrations, e.g., mapping and/or synchronizing applications, importing scans, etc. (In order to access the Remote Providers page, this permission must be granted at the global level.)

Manage Groups

Allows user to create or delete groups of users, and set roles for those groups.

View Error Logs

Allows user to view error logs generated by ThreadFix in the Settings menu. (In order to access the Error Messages page, this permission must be granted at the global level.)

Manage Audit History

Allows user to access the History page to view events for applications the user has permission to access.

Manage Scan Result Filters

Allows user to change severity or suppress scanner vulnerability types.

Manage Custom CWE Text

Allows user to create custom text entries mapped to CWE definitions.

Manage Metadata Keys

Allows user to create, edit, and disable keys allowed for Scan and Application Metadata.

Manage Pen Test Teams

Allows user to create, edit, and delete Pen Test Teams as well as attach Users and Groups to Pen Test Teams.

Queue

Queue

Manage Queue

Allows user to cancel queued tasks.

View Queued Items

Allows user to view queued items.

View Processing Queued Items

Allows user to view currently-processing items in the queue.

Infrastructure

Infrastructure

Manage Networks

Allows user to create, edit, and delete networks.

Manage Assets

Allows user to create, edit, archive and unarchive network assets.

Delete Assets

Allows user to delete network assets.

Manage Remote Providers

Allows user to create, edit, and delete remote provider configurations to network tools.

Manage Remote Provider Scans

Allows user to create, edit, and delete scheduled scan imports from network remote providers.

Upload Scans

Allows user to upload a scan file from a supported network scanner.

Delete Scans

Allows user to delete existing network scans.

Manage Vulnerabilities

Allows user to edit network vulnerabilities.

View Infrastructure

Allows users to access network infrastructure.

Manage Network Groups

Allows users to edit network groups.

 

 

 

 

 

www.threadfix.it | www.coalfire.com
Copyright © 2024 Coalfire. All rights reserved.

This Information Security Policy is CoalFire - Public: Distribution of this material is not limited.