- Defined in:
An enumerated type that contains the possible roles a user may have. Refer to the product manual for a complete list of what each role means.
- USER_ROLE_ADMINISTRATOR =
A user role that can do anything on the box, including full access to all objects in all partitions.
- USER_ROLE_TRAFFIC_MANAGER =
A user role that has limited read/write access, such as enabling/disabling nodes, pools, and members...., but not adding/removing nodes from pools.
- USER_ROLE_GUEST =
A user role that read-only access.
- USER_ROLE_ASM_POLICY_EDITOR =
A user role who can read/write every configuration aspect in ASM, read/write to all applications, and deal with all configuration that is global per ASM.
- USER_ROLE_INVALID =
An uninitialized or invalid role.
- USER_ROLE_MANAGER =
A user role who can administer all objects in a specific partition, including read access in the Common partition, but no objects outside of his/her partition.
- USER_ROLE_EDITOR =
A user role who can only modify objects in a specific partition (i.e. not create or delete)
- USER_ROLE_APPLICATION_EDITOR =
A user role who can administer objects for an application (LTM, GTM, LC...). This includes ability to read/update permissions to pools, nodes, monitors, add/remove members from pools...
- USER_ROLE_CERTIFICATE_MANAGER =
A user role who can administer all security keys and certificates in a partition.
- USER_ROLE_USER_MANAGER =
A user role who can manage user accounts in a partition.
- USER_ROLE_RESOURCE_ADMINISTRATOR =
A user role who can manage everything except user accounts and device authentication settings
- USER_ROLE_ASM_EDITOR =
A user role who has read/write rights to perform changes on ASM policies within one or many web application or one or many administrative domain partitions.
Methods inherited from