In Artica, administrators can establish a session in the Artica console based on their user accounts stored in a remote Active Directory or OpenLDAP server, or Artica's own OpenLDAP server, or via Artica's local database.
In this case, Artica provides Role-based access control (RBAC) feature that is a policy-neutral access-control mechanism defined around roles and privileges.
The components of RBAC such as role-permissions, user-role and role-role relationships make it simple to perform user assignments.
In the Active Directory context, you must specify in the LDAP connections that the Active Directory connection is also authorized to check user accounts when connecting to the Artica login page.
Active Directory > LDAP Authentication
Artica manages privileges according to user groups.
As the "Proxy Monitor" privilege is a restricted privilege, the best thing to do is to dedicate a user group for this purpose.
Please note that groups are cumulative.
If you assign an administrator to a group that has "Proxy Administrator" privileges and is also assigned to a "Proxy Monitor" group, the user will have both privileges, which will not restrict the user's rights.
In our case, we have created a group proxy_monitor inside the Active Directory database
On the Artica Web console, click on the top menu “Members”