LogoLogo
APISupportDashboard
  • Welcome
  • Platform
    • Platform Overview
    • Getting Started Guide
    • Discovery
      • Domain Discovery
      • Network Discovery
      • Discovered Assets
    • Targets
      • Scan Policies
      • Add-on Services
      • Tags & Filtering
        • Default Tags
      • Managing Targets
      • Scan Configuration
    • Risk
    • Firewalls
      • Ports
      • HTTP Servers
      • DNS Records
    • Websites
      • Certificates
      • Scripts
      • Cookies
      • Headers
      • Forms
      • Links
      • Downloads
      • Traffic Hosts
      • Meta Tags
      • Pages
    • Technology
    • Issues
      • Vulnerability Management
      • Issue Settings
    • Reports
    • Compliance
    • Projects
      • Penetration Testing
      • Other Projects
    • Events
      • Event Rules
      • Event Types
    • Automations
      • Target Automations
      • Asset Automations
      • Target Issue Automations
  • Integrations
    • Discovery Integrations
      • Azure
      • Google Cloud
      • AWS
      • Cloudflare
      • Oracle Cloud Infrastructure
      • F5
      • GoDaddy
      • Wiz
      • HTTP
    • Workflow Integrations
      • Slack
      • Google Chat
      • Jira
      • PagerDuty
      • Splunk
      • AWS
      • Vanta
      • Microsoft Teams
      • ArmorCode
      • Zapier
        • Slack (via Zapier)
        • Jira (via Zapier)
        • Service Now (via Zapier)
    • Feeds
      • Using Feeds with Google Sheets
    • API
    • Webhooks
  • Account
    • Account Overview
      • Account Security
    • Users
      • Roles & Permissions
Powered by GitBook

© 2024 Halo Security

On this page
  • User Roles
  • Permissions
  • Security Target Access

Was this helpful?

  1. Account
  2. Users

Roles & Permissions

Roles and permissions limit user access to data in your organization's account.

User Roles

When adding a user to your organization's account, there are 6 roles you can assign them to limit their access to functionality and viewing information about targets in the system. These roles are:

  • Administrator - Full control of the account, users, and billing

  • Power User - Full target management

  • User - Access findings

  • Viewer - View reports and update/assign workflows

  • Marketing - Access Certification data

  • Billing - Manage payment information and subscriptions

Permissions

Assigned roles have permission to perform the following actions in your organization's account:

Permission
User

Manage Users

Add or remove users from the account and edit user details.

Administrator

Manage Billing

Update or edit payment information. Create or cancel subscriptions.

Administrator Billing

Manage Targets

Add or remove targets. Assign licenses to targets.

Administrator *Power User

Integrations

Manage integrations with third-party services.

Administrator Power User

Manage Exceptions

Create and manage exceptions.

Administrator *Power User *User

Manage Workflows

Assign or update the status of workflows.

Administrator *Power User *User *Viewer

Acknowledge Hosts

Acknowledge and un-acknowledge connected hosts.

Administrator *Power User *User

Start Scan Begin scans.

Administrator *Power User *User

View Reports

View and download reports.

Administrator Power User User Viewer

Discovery

View Discovery.

Administrator *Power User *User *Viewer

Certification

Manage all certification settings, including adding new sites.

Administrator Power User User Viewer Marketing

Breach Insurance

Manage and view Breach Insurance information.

Administrator Power User User Viewer Marketing

Search Submission

Start crawls, manage settings, and view Search Submission results.

Administrator Power User User Viewer Marketing

Diagnostics Start crawls, manage settings, and view and hide Diagnostics results.

Administrator Power User User Viewer Marketing

Security Target Access

Security Target Access lets you limit users to only accessing certain targets. Users can have tags set that allow them to access only targets with those tags in all sections of the application including Targets, Firewalls, Websites, Issues, and Events.

For Discovery permissions, users with the Power User, User, and Viewer roles will be limited by their Security Target Access settings. If a tag is set, they will have no access to the Discovery portion of the application.

PreviousUsers

Last updated 3 months ago

Was this helpful?

Security Target Access tags can be assigned when creating a user, and multiple tags can be selected. If you later wish to change a user's tags, you can do so by clicking their name in the panel and going to Permissions.

User