Provide Granular Access to the Device Tab
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
-
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
End-of-Life (EoL)
Provide Granular Access to the Device Tab
To define granular access privileges for the ),
scroll down to the
Device
tab,
when creating or editing an admin role profile (Device
Admin Roles
Device
node on the WebUI
tab.Access Level | Description | Enable | Read Only | Disable |
---|---|---|---|---|
Setup | Controls access to the Setup node.
If you disable this privilege, the administrator will not see the Setup node
or have access to firewall-wide setup configuration information,
such as Management, Operations, Service, Content-ID, WildFire or
Session setup information.If the privilege state is set to read-only,
you can view the current configuration but cannot make any changes. | Yes | Yes | Yes |
Management | Controls access to the Management node.
If you disable this privilege, the administrator will not be able
to configure settings such as the hostname, domain, timezone, authentication,
logging and reporting, Panorama connections, banner, message, and password complexity settings, and more.If
the privilege state is set to read-only, you can view the current configuration
but cannot make any changes. | Yes | Yes | Yes |
Operations | Controls access to the Operations and Telemetry
and Threat Intelligence nodes. If you disable this privilege,
the administrator cannot:
Only
administrators with the predefined Superuser role can export or import
firewall configurations and shut down the firewall. Only administrators
with the predefined Superuser or Device Administrator role can reboot
the firewall or restart the dataplane. Administrators with
a role that allows access only to specific virtual systems cannot
load, save, or revert firewall configurations through the Device Operations | Yes | Yes | Yes |
Services | Controls access to the Services node.
If you disable this privilege, the administrator will not be able
to configure services for DNS servers, an update server, proxy server,
or NTP servers, or set up service routes.If the privilege
state is set to read-only, you can view the current configuration
but cannot make any changes. | Yes | Yes | Yes |
Content-ID | Controls access to the Content-ID node. If
you disable this privilege, the administrator will not be able to
configure URL filtering or Content-ID.If the privilege state
is set to read-only, you can view the current configuration but
cannot make any changes. | Yes | Yes | Yes |
WildFire | Controls access to the WildFire node.
If you disable this privilege, the administrator will not be able
to configure WildFire settings.If the privilege state is
set to read-only, you can view the current configuration but cannot
make any changes. | Yes | Yes | Yes |
Session | Controls access to the Session node.
If you disable this privilege, the administrator will not be able
to configure session settings or timeouts for TCP, UDP or ICMP, or
configure decryption or VPN session settings.If the privilege
state is set to read-only, you can view the current configuration
but cannot make any changes. | Yes | Yes | Yes |
HSM | Controls access to the HSM node.
If you disable this privilege, the administrator will not be able
to configure a Hardware Security Module.If the privilege
state is set to read-only, you can view the current configuration
but cannot make any changes. | Yes | Yes | Yes |
High Availability | Controls access to the High Availability node.
If you disable this privilege, the administrator will not see the High
Availability node or have access to firewall-wide high availability
configuration information such as General setup information or Link
and Path Monitoring.If you set this privilege to read-only, the
administrator can view High Availability configuration information
for the firewall but is not allowed to perform any configuration
procedures. | Yes | Yes | Yes |
Config Audit | Controls access to the Config
Audit node. If you disable this privilege, the administrator
will not see the Config Audit node or have
access to any firewall-wide configuration information. | Yes | No | Yes |
Administrators | Controls access to the Administrators node.
This function can only be allowed for read-only access.If
you disable this privilege, the administrator will not see the Administrators node
or have access to information about their own administrator account.If
you set this privilege to read-only, the administrator can view
the configuration information for their own administrator account.
They will not see any information about other administrator accounts
configured on the firewall. | No | Yes | Yes |
Admin Roles | Controls access to the Admin
Roles node. This function can only be allowed for read-only
access.If you disable this privilege, the administrator will
not see the Admin Roles node or have access
to any firewall-wide information concerning Admin Role profiles configuration.If
you set this privilege to read-only, you can view the configuration
information for all administrator roles configured on the firewall. | No | Yes | Yes |
Authentication Profile | Controls access to the Authentication Profile node.
If you disable this privilege, the administrator will not see the Authentication Profile node
or be able to create or edit authentication profiles that specify
RADIUS, TACACS+, LDAP, Kerberos, SAML, multi-factor authentication
(MFA), or local database authentication settings. PAN-OS uses authentication
profiles to authenticate firewall administrators and Authentication
Portal or GlobalProtect end users.If you set this privilege
to read-only, the administrator can view the Authentication Profile information
but cannot create or edit authentication profiles. | Yes | Yes | Yes |
Authentication Sequence | Controls access to the Authentication Sequence node.
If you disable this privilege, the administrator will not see the Authentication Sequence node
or be able to create or edit an authentication sequence.If
you set this privilege to read-only, the administrator can view
the Authentication Profile information but
cannot create or edit an authentication sequence. | Yes | Yes | Yes |
Virtual Systems | Controls access to the Virtual
Systems node. If you disable this privilege, the administrator
will not see or be able to configure virtual systems.If the
privilege state is set to read-only, you can view the currently configured
virtual systems but cannot add or edit a configuration. | Yes | Yes | Yes |
Shared Gateways | Controls access to the Shared Gateways node.
Shared gateways allow virtual systems to share a common interface
for external communications.If you disable this privilege,
the administrator will not see or be able to configure shared gateways. If
the privilege state is set to read-only, you can view the currently configured
shared gateways but cannot add or edit a configuration. | Yes | Yes | Yes |
User Identification | Controls access to the User Identification node.
If you disable this privilege, the administrator will not see the User Identification node
or have access to firewall-wide User Identification configuration
information, such as User Mapping, Connection Security, User-ID Agents,
Terminal Server Agents, Group Mappings Settings, or Authentication
Portal Settings.If you set this privilege to read-only, the
administrator can view configuration information for the firewall
but is not allowed to perform any configuration procedures. | Yes | Yes | Yes |
VM Information Source | Controls access to the VM Information Source node
that allows you to configure the firewall/Windows User-ID agent
to collect VM inventory automatically. If you disable this privilege,
the administrator will not see the VM Information Source node.If
you set this privilege to read-only, the administrator can view
the VM information sources configured but cannot add, edit, or delete
any sources. This privilege is not available to Device
Group and Template administrators. | Yes | Yes | Yes |
Certificate Management | Sets the default state to enable or disable
for all of the Certificate settings described below. | Yes | No | Yes |
Certificates | Controls access to the Certificates node.
If you disable this privilege, the administrator will not see the Certificates node or
be able to configure or access information regarding Device Certificates
or Default Trusted Certificate Authorities.If you set this
privilege to read-only, the administrator can view Certificate configuration
information for the firewall but is not allowed to perform any configuration
procedures. | Yes | Yes | Yes |
Certificate Profile | Controls access to the Certificate Profile node.
If you disable this privilege, the administrator will not see the Certificate Profile node
or be able to create certificate profiles.If you set this
privilege to read-only, the administrator can view Certificate Profiles
that are currently configured for the firewall but is not allowed
to create or edit a certificate profile. | Yes | Yes | Yes |
OCSP Responder | Controls access to the OCSP Responder node.
If you disable this privilege, the administrator will not see the OCSP
Responder node or be able to define a server that will be
used to verify the revocation status of certificates issues by the
firewall.If you set this privilege to read-only, the administrator
can view the OCSP Responder configuration
for the firewall but is not allowed to create or edit an OCSP responder
configuration. | Yes | Yes | Yes |
SSL/TLS Service Profile | Controls access to the SSL/TLS
Service Profile node.If you disable this privilege,
the administrator will not see the node or configure a profile that
specifies a certificate and a protocol version or range of versions
for firewall services that use SSL/TLS. If you set this privilege
to read-only, the administrator can view existing SSL/TLS Service
profiles but cannot create or edit them. | Yes | Yes | Yes |
SCEP | Controls access to the SCEP node.
If you disable this privilege, the administrator will not see the
node or be able to define a profile that specifies simple certificate enrollment
protocol (SCEP) settings for issuing unique device certificates.If
you set this privilege to read-only, the administrator can view
existing SCEP profiles but cannot create or edit them. | Yes | Yes | Yes |
SSL Decryption Exclusion | Controls access to the SSL Decryption Exclusion node.
If you disable this privilege, the administrator will not see the
node or be able to add custom exclusions.If you set this
privilege to read-only, the administrator can view existing SSL decryption
exceptions but cannot create or edit them. | Yes | Yes | Yes |
SSH Service Profile | Controls access to the SSH Service Profile node.
If you disable this privilege, the administrator will be unable
to see the node or configure a profile to specify parameters for
SSH connections to your Palo Alto Networks management and high availability
(HA) appliances.If you set this privilege to read-only, the
administrator can view existing SSH service profiles but cannot
edit or create them. | Yes | Yes | Yes |
Response Pages | Controls access to the Response
Pages node. If you disable this privilege, the administrator
will not see the Response Page node or be
able to define a custom HTML message that is downloaded and displayed instead
of a requested web page or file.If you set this privilege
to read-only, the administrator can view the Response
Page configuration for the firewall but is not allowed
to create or edit a response page configuration. | Yes | Yes | Yes |
Log Settings | Sets the default state to enable or disable
for all of the Log settings described below. | Yes | No | Yes |
System | Controls access to the Log Settings System Log Settings System If you set this privilege
to read-only, the administrator can view the Log Settings System | Yes | Yes | Yes |
Configuration | Controls access to the Log Settings Configuration Log Settings Configuration If you set
this privilege to read-only, the administrator can view the Log Settings Configuration | Yes | Yes | Yes |
User-ID | Controls access to the Log Settings User-ID Log Settings User-ID If you set this
privilege to read-only, the administrator can view the Log Settings User-ID | Yes | Yes | Yes |
HIP Match | Controls access to the Log Settings HIP Match Log Settings HIP Match If you set this privilege to read-only, the
administrator can view the Log Settings HIP | Yes | Yes | Yes |
GlobalProtect | Controls access to the Log Settings GlobalProtect Log Settings GlobalProtect If you set
this privilege to read-only, the administrator can view the Log Settings GlobalProtect | Yes | Yes | Yes |
Correlation | Controls access to the Log Settings Correlation Log Settings Correlation If you set this privilege
to read-only, the administrator can view the Log Settings Correlation | Yes | Yes | Yes |
Alarm Settings | Controls access to the Log Settings Alarm Settings Log Settings Alarm Settings If you set this privilege to read-only, the administrator
can view the Log Settings Alarm Settings | Yes | Yes | Yes |
Manage Logs | Controls access to the Log Settings Manage Logs Log Settings Manage Logs If you set this privilege to
read-only, the administrator can view the Log Settings Manage Logs | Yes | Yes | Yes |
Server Profiles | Sets the default state to enable or disable
for all of the Server Profiles settings described below. | Yes | No | Yes |
SNMP Trap | Controls access to the Server Profiles SNMP Trap Server Profiles SNMP Trap If you set this privilege to read-only, the
administrator can view the Server Profiles SNMP Trap Logs | Yes | Yes | Yes |
Syslog | Controls access to the Server Profiles Syslog Server Profiles Syslog If you set
this privilege to read-only, the administrator can view the Server Profiles Syslog | Yes | Yes | Yes |
Email | Controls access to the Server Profiles Email Server Profiles Email If
you set this privilege to read-only, the administrator can view
the Server Profiles Email | Yes | Yes | Yes |
HTTP | Controls access to the Server Profiles HTTP Server Profiles HTTP If you set this privilege
to read-only, the administrator can view the Server Profiles HTTP | Yes | Yes | Yes |
Netflow | Controls access to the Server Profiles Netflow Server Profiles Netflow If you set this privilege to read-only, the
administrator can view the Server Profiles Netflow | Yes | Yes | Yes |
RADIUS | Controls access to the Server Profiles RADIUS Server Profiles RADIUS If you set this privilege to read-only, the
administrator can view the Server Profiles RADIUS | Yes | Yes | Yes |
TACACS+ | Controls access to the Server Profiles TACACS+ If you
disable this privilege, the administrator will not see the node
or configure settings for the TACACS+ servers that authentication
profiles reference. If you set this privilege to read-only, the
administrator can view existing TACACS+ server profiles but cannot
add or edit them. | Yes | Yes | Yes |
LDAP | Controls access to the Server Profiles LDAP Server Profiles LDAP If you set this privilege to read-only, the administrator
can view the Server Profiles LDAP | Yes | Yes | Yes |
Kerberos | Controls access to the Server Profiles Kerberos Server Profiles Kerberos If you set this privilege
to read-only, the administrator can view the Server Profiles Kerberos | Yes | Yes | Yes |
SAML Identity Provider | Controls access to the Server Profiles SAML Identity Provider If
you set this privilege to read-only, the administrator can view
the Server Profiles SAML Identity Provider | Yes | Yes | Yes |
Multi Factor Authentication | Controls access to the Server Profiles Multi Factor Authentication If
you set this privilege to read-only, the administrator can view
the Server Profiles SAML Identity Provider | |||
Local User Database | Sets the default state to enable or disable
for all of the Local User Database settings described below. | Yes | No | Yes |
Users | Controls access to the Local
User Database Users Local User Database Users If you set this privilege to read-only, the
administrator can view the Local User Database Users | Yes | Yes | Yes |
User Groups | Controls access to the Local
User Database Users Local User Database Users If
you set this privilege to read-only, the administrator can view
the Local User Database Users | Yes | Yes | Yes |
Access Domain | Controls access to the Access
Domain node. If you disable this privilege, the administrator
will not see the Access Domain node or be
able to create or edit an access domain.If you set this privilege
to read-only, the administrator can view the Access Domain information
but cannot create or edit an access domain. | Yes | Yes | Yes |
Scheduled Log Export | Controls access to the Scheduled
Log Export node. If you disable this privilege, the
administrator will not see the Scheduled Log Export node
or be able schedule exports of logs and save them to a File Transfer
Protocol (FTP) server in CSV format or use Secure Copy (SCP) to securely
transfer data between the firewall and a remote host.If you
set this privilege to read-only, the administrator can view the Scheduled
Log Export Profile information but cannot schedule the
export of logs. | Yes | No | Yes |
Software | Controls access to the Software node.
If you disable this privilege, the administrator will not see the Software node
or view the latest versions of the PAN-OS software available from
Palo Alto Networks, read the release notes for each version, and
select a release to download and install.If you set this
privilege to read-only, the administrator can view the Software information
but cannot download or install software. | Yes | Yes | Yes |
GlobalProtect Client | Controls access to the GlobalProtect Client node.
If you disable this privilege, the administrator will not see the GlobalProtect Client node
or view available GlobalProtect releases, download the code or activate
the GlobalProtect app.If you set this privilege to read-only, the
administrator can view the available GlobalProtect Client releases
but cannot download or install the app software. | Yes | Yes | Yes |
Dynamic Updates | Controls access to the Dynamic Updates node.
If you disable this privilege, the administrator will not see the Dynamic Updates node
or be able to view the latest updates, read the release notes for
each update, or select an update to upload and install.If
you set this privilege to read-only, the administrator can view
the available Dynamic Updates releases, read
the release notes but cannot upload or install the software. | Yes | Yes | Yes |
Licenses | Controls access to the Licenses node.
If you disable this privilege, the administrator will not see the Licenses node
or be able to view the licenses installed or activate licenses.If
you set this privilege to read-only, the administrator can view
the installed Licenses , but cannot perform
license management functions. | Yes | Yes | Yes |
Support | Controls access to the Support node.
If you disable this privilege, the administrator cannot see the Support node, activate
support, or access production and security alerts from Palo Alto Networks.If
you set this privilege to read-only, the administrator can see the Support node
and access production and security alerts but cannot activate support. | Yes | Yes | Yes |
Master Key and Diagnostics | Controls access to the Master
Key and Diagnostics node. If you disable this privilege,
the administrator will not see the Master Key and Diagnostics node
or be able to specify a master key to encrypt private keys on the
firewall.If you set this privilege to read-only, the administrator
can view the Master Key and Diagnostics node
and view information about master keys that have been specified
but cannot add or edit a new master key configuration. | Yes | Yes | Yes |