Role-Based Access in Cisco MSX
In Cisco MSX, user permissions are managed using Role-Based Access Control (RBAC). RBAC restricts or authorizes system access for users based on user roles. Based on the permissions assigned to a user by an administrator, a user can define and customize how their services are exposed to customers. The permissions allow the user to customize various aspects of a service workflow, such as managing tenants, notifications, integration with BSS systems, announcements, and so on. The role-based access permissions are categorized into the following categories:
-
Service Pack Specific Permissions: Include permissions for controlling various settings for the service packs.
-
Services, Configurations, and Devices Specific Permissions: Include permissions for configuring various settings for the devices and services.
-
Integrations, Settings, and Log Specific Permissions: Include permissions for controlling integration, log, and SSO configurations.
-
Users, Roles, and Tenants Specific Permissions: Include permissions to configure user, remote users, tenants, roles, provider settings, and so on.
For more information on all the available permissions in Cisco MSX and to also see the minimum required permissions to perform various operations in Cisco MSX, see the latest version of Cisco Managed Services Accelerator (MSX) 4.2 Platform and Service Pack Permissions Addendum.
![]() Note |
You will need Cisco Customer or Cisco Employee privileges to access the Cisco MSX documentation. |
Cisco MSX provides out-of-the-box roles that have permissions applied by default. You can either modify the permissions associated with these out-of-the-box roles or add a new role. For the description of these permissions, see the latest version of Cisco Managed Services Accelerator (MSX) 4.2 Platform and Service Pack Permissions Addendum.
Cisco MSX Out-of-the-box Roles
The following are the out-of-the-box roles available with Cisco MSX:
-
Service Provider Operators support multiple customers by maintaining service information and settings, viewing, monitoring the SP-DNA platform, remediating basic customer issues, and escalating severe issues.
-
Service Provider Administrators have Operator permissions and can also perform more advanced tasks like managing price plans, importing, and exporting service definitions, and configuring the service platform.
-
Service Provider API Administrators update tenant data using API calls instead of the standard methods available through applications and platform web interface. This is a powerful role, as it bypasses Tenant RBAC checks.
-
Tenant Administrators have Tenant Operator permissions and can also perform more advanced tasks like managing service policies and configurations.
-
Super User supports all actions from user management to service management or operator.
-
Enterprise Administrator is a superset of Tenant Admin-level permissions, but with additional capabilities of accessing billing and licensing insights.
-
Workflow Administrator can view and manage workflows and instances.
-
Workflow User can view and manage workflow instances.
For more information on how to add a new role or modify an existing role and to associate this role to a user, see Managing User Roles and Managing Users.