Administrative roles
With the release of Airlock Gateway 8.3, we have cleaned up our administrative role matrix based on customer feedback.
Customizing administration roles for Airlock Gateway is no longer possible for Airlock Gateway 8.3 and later.
The role airlock-supervisor
has been removed. Use the role airlock-administrator
instead.
Role descriptions and use cases
Role name | Description |
---|---|
|
|
|
This role can be used for strict 4-eyes principle configuration workflows, where the |
|
This role can be used for strict 4-eyes principle configuration workflows, where the |
|
The role is intended for users who need to be able to turn maintenance pages on or off in the event of maintenance work on back-end applications or switch between redundant back-end hosts. |
|
The role is intended for users responsible for integrating and maintaining application mappings when entry points (virtual hosts) and back-end groups are already defined. |
|
This role is for managing certificates for Airlock Gateway and applications. This includes server certificates, client certificates, and their use, as well as local JWKS providers and the use of JWKS providers. |
|
The role is for auditors who are supposed to audit/review Airlock Gateway configurations, including the possibility to compare different configurations with each other. |
|
The role is intended for read-only access for log evaluation and reporting. |
|
The role is intended for read-only access in cases where access to logs and other sensitive information should not be possible. |
Actions
Action | airlock-administrator | airlock-config-editor | airlock-config-applier | airlock-app-operator | airlock-app-admin | airlock-cert-admin | airlock-auditor | airlock-readonly | airlock-readonly-restricted |
---|---|---|---|---|---|---|---|---|---|
Log in to the Configuration Center | x | x | x | x | x | x | x | x | x |
Change own password | x | x | x | x | x | x | x | x | x |
Activate configuration | x | x | x | x | x | ||||
Revalidate configuration | x | x | x | x | x | x | |||
Load configuration | x | x | x | x | |||||
Save configuration | x | x | x | ||||||
Export configuration | x | x | x (w/o private keys) | ||||||
Import configuration | x | x | x | ||||||
Export mapping | x | x | x | x | |||||
Import mapping | x | x | x | ||||||
System Admin actions1 | x | ||||||||
Upload update | x | ||||||||
Session Viewer list | x | x | x | x | x | x | x | ||
Session Viewer details | x | ||||||||
Terminate session | x | ||||||||
Policy Learning | x | x | x | ||||||
View logs | x | x | x | x | x | x | x | ||
View reports | x | x | x | x | x | x | x | ||
Dashboard → Proxy Statistics | x | x | x | x | x | x | x | ||
Configuration summary | x | x | x | x | x | x | x | x | |
Manage add-on modules | x |
- 1
Set time/date, shutdown/reboot, take offline, API key actions
Configuration management
Configuration item | airlock-administrator | airlock-config-editor | airlock-config-applier | airlock-app-operator | airlock-app-admin | airlock-cert-admin | airlock-auditor | airlock-readonly | airlock-readonly-restricted |
---|---|---|---|---|---|---|---|---|---|
License | RW | R | R | R | |||||
Nodes, Interface, Routes, Hosts | RW | RW | R | R | R | R | R | R | R |
Network Services | RW | RW | R | R | R | R | R | R | R |
Threat Intelligence | RW | R | R | R | R | R | R | R | |
IP Address Lists | RW | RW | R | R | R | R | R | R | |
Reverse Proxy (connections) | RW | RW | R | R | RW | R | R | R | R |
Virtual Hosts | RW | RW | R | RW5 | R | RW2 | R | R | R |
Mappings | RW | RW | R | RW5 | RW | RW4 | R | R | R |
Back-end Groups | RW | RW | R | RW6 | R | RW3 | R | R | R |
Anomaly Shield | RW | RW | R | R | R | R | R | R | R |
Geolocation Filter | RW | RW | R | R | R | R | R | R | R |
Certificates | RW | RW | R | R8 | R8 | RW1 | R8 | R8 | |
JWKS Providers | RW | RW | R | R8 | R8 | RW7 | R8 | R8 | |
Session Settings | RW | RW | R | R | R | R | R | R | R |
Default Actions | RW | RW | R | R | R | R | R | R | R |
Deny Rules | RW | RW | R | R | R | R | R | R | R |
API Security | RW | RW | R | R | R | R | R | R | R |
Dynamic IP Blacklist | RW | RW | R | R | R | R | R | R | R |
Error Pages | RW | RW | R | R | R | R | R | R | R |
Display Error Pages | RW | RW | R | R | R | R | R | R | R |
Expert Settings | RW | RW | R | R | R | R | R | R |
- 1
No write access to ACME Services.
- 2
Write access allows assigning certificates to virtual hosts or switching to ACME service (incl. e-mail), writing the HTTPS flag, the HTTPS port to VHosts, and the redirect flag HTTP → HTTPS.
- 3
Write access allows the assignment of client certificates to back-end groups.
- 4
Write access allows for setting, removing and changing JWKS providers.
- 5
Write access allows enabling and deactivating maintenance pages.
- 6
Write access allows editing back-end host modes, spare flags, and weight.
- 7
Write access on JWKS local providers only (no write access to JWKS remote providers).
- 8
No viewing access to details of certificates (client and server) and local JWKS.