This section explains how Role-Based Access Control (RBAC) for users and groups works in Qumulo Core, explains the role types, and shows how to manage them by using the Qumulo Core Web UI.

To share management responsibilities with others, you can grant specific privileges to a user or group—locally or through Active Directory—by using RBAC.

Built-In Roles

Qumulo Core includes built-in roles that provide predefined privileges for common administrative operations to typical access control personas. This section explains the use cases and the authorization scope for each built-in role.

Administrators

This role is suitable for system administrators. Users with this role have full access to, and control of, the cluster, including:

  • Configuration and management of general cluster settings for audit logging, snapshots, replication, quotas, and so on by using the Qumulo Core Web UI, REST API, or qq CLI
  • Creation of files and directories in any current and future directories
  • Reading of any files and file attributes and listing of any directories in any current and future directories
  • Deletion or renaming of any files and directories in any current and future directories
  • Changing of ownership and permissions for any files and directories in any current and future directories

Data-Administrators

This role is suitable for Qumulo REST API and qq CLI users who don’t have access to the Qumulo Core Web UI but have the same file privileges as those of the Administrators role, including:

  • Read and write permissions for all NFS, SMB, quota, and snapshot REST APIs
  • Read-only permissions for local REST API users
  • Access to analytics and file system

Observers

This role is suitable for users or groups who can access the Qumulo Core Web UI and read-only REST APIs (with the exception of DEBUG REST APIs and authentication settings).

Qumulo-Support