HubStor Inc.

How to Use HubStor's Role Based Access Control (RBAC)

HubStor includes Role-Based Access Control (RBAC) for managing authorization. After authenticating, all access, whether they be administrators, privileged users, or end-users, must pass this authorization layer before they are granted access in HubStor.

This article provides instructions on how to configure principals and roles, and explains the different permissions that can be applied.

Step 1 -- Navigate to Users & Roles

Click the 'Administration' tab and then click 'Users & Roles'.

Step 2 -- Create and Configure Roles

Using roles is optional. If you prefer to administer permissions on a per user or per group basis, skip to Step 3.

To create roles, click the 'Roles' tab and then click the 'Add Role' button.

NOTE: You'll notice that there is a 'Default' role. For information on this, see WHAT IS THE DEFAULT ROLE USED FOR IN HUBSTOR?

Clicking 'Add Role' will display the 'Manage Role' window. Enter a name and optionally provide a description.

Next, click the 'Permissions' tab and configure the desired permissions for the role. For a detailed description of each permission, see DEFINITION OF THE PERMISSIONS IN HUBSTOR'S AUTHORIZATION / RBAC MODEL.

NOTE: You'll only need to consider the 'Securable Sub Object Permissions' tab if you select the 'eDiscovery App' permission. For more information, see CONFIGURING AUTHORIZATION FOR EDISCOVERY.

Next, click the 'Members' tab to add users and/or groups to the role. Click the blue checkbox beside the users / groups you wish to add to the role. When finished, click 'Apply' to save the role.

: In the 'Members' tab, you can click the column headers to sort. You can also search in the text box to quickly find the users / groups that you are looking for.

Step 3 -- (Optional) Configure Users / Groups Individually

Instead of, or in addition to, you can configure authorization from users / groups.

Click the 'Users/Groups' tab. Here you'll see a complete listing of all users and groups from your directory, in addition to automatically populated external users (from any external sharing) and shadow users. Use the column sorting feature, filtering, or search to find the principal(s) you wish to edit, then click the edit icon to configure their permissions and role membership(s).

    • Related Articles

    • Overview of Link-based Stubbing

      HubStor's link-based stubbing method is intended for use with CIFS/NFS-based storage, such as NetApp or EMC Celerra. It can also work with Windows-based file shares. With HubStor's link-based stubbing, you can perform simple and effective ...
    • How to Install and Configure Link-based Stubbing

      This article describes the steps necessary to configure link-based stubbing. Below are the high-level steps involved: Select a Windows Server to act as the Retrieval Server.  This server can an existing Windows Server or a provisioned virtual ...
    • Definition of the Permissions in HubStor's Authorization / RBAC Model

      Access All Items This permission permits a user to retrieve any folder/item in the entire HubStor tenant, even when an item has the 'Prevent Retrieval' tag behavior associated to it. It is the only permission that is not granted as part of the 'Full ...
    • What is the 'Default' Role Used for in HubStor?

      In HubStor's Role-Based Access Control (RBAC) model there is always a 'Default' role that exists, to which all users are added. The default configuration for the Default role is access to the HubStor User Portal and the ability to perform retrieval, ...
    • Overview of the HubStor Connector Service (HCS)

      The HCS is software that is deployed behind your firewall to provide policy-based archiving to your HubStor cloud tenant. The HCS runs on a Windows VM, uses a service account, and can be installed and configured in minutes. With the HCS installed, ...