2016 Symantec Corporation This document may be freely reproduced & distributed whole & intact including this copyright
notice.
25
2.5 Services and CSP Access
Table 2-8 shows which services can be accessed by users with different roles.
.
Table 2
–8 Services Authorized for Roles
Auditor
(User)
Manage
Appliance
Manage
Policy
Manage PKI
(Crypto
Officer)
Authorized Service
Y
Y
Unlock secure store
Y
Y
Y
Y
View dashboards
Y
Y
View system log data
Y
Y
View/export SSL session log, SSL errors
Y
Y
View SSL statistics
Y
Y
View/export intercepted certificates
Y
Export diagnostic information: PKI state
Y
Export diagnostic information: policy state
Y
Y
Y
Y
Export diagnostic information: platform state
Y
Y
Export diagnostic information: SSL statistics
Y
Y
Export diagnostic information: host statistics, NFP
statistics
Y
Y
Y
Y
Export diagnostic information: platform interfaces
and platform status statistics
Y
Y
View debug information: SSL statistics
Y
Y
Y
Y
View debug information: NFE network statistics
Y
Y
View debug information: NSM host statistics, NSM
NFP statistics
Y
Create/edit/delete rulesets, rules, segments, and
user defined lists
Y
Y
View rulesets, rules, segments, and user defined
lists
Y
Activate/deactivate segments.
Y
Create/delete/export/import internal CA keys and
certificates used for re-signing
Y
Delete/import external CA certificates
Y
Delete/import CRLs
Y
Import/delete trusted certificates
Y
Import/delete known keys and certificates