Assign users to roles
This topic describes how to manage role membership in the CyberArk Identity Admin Portal to control authorization to features and services.
Roles are the most efficient way to
By default, all new users are added to the Everybody role. Members of the Everybody role are automatically granted permission to access the CyberArk Identity User Portal. Make sure the Everybody role allows user access to the CyberArk Identity User Portal at all times.
Before you begin
Check the following:
You must be assigned to the System Administrator role or to a role with the Role Management administrative right. You can only create roles and assign users to roles if you have the appropriate rights.
The CyberArk Identity Connector is installed and the AD users and groups are integrated into CyberArk Identity.
See Install the CyberArk Identity Connector.This prerequisite enables:
domain users to log in to the User Portal using their domain credentials
- adding domain users to roles
The following procedure describes how to add members to existing roles.
To assign users to a role
- In the Admin Portal, click Roles.
- Select the role from the list of available roles. See built-in roles defined per CyberArk service.
- Click Members, then click Add to display the Add Members dialog box.
Start typing the user name, Active Directory/LDAP group name, or an existing role.For CyberArk Cloud Directory users, you can also search by email domain suffix.
You can add an CyberArk Identity role to an existing role. This is referred to as nesting a role. When you add a role to an existing role, the nested role members inherit all of the applications and rights assigned in the parent role. However, the applications and rights inherited from the parent are not displayed when you select the nested role. Only the nested role members have the rights and applications assigned to the nested role, while the parent role members do not.
Additionally, if you are also using Active Directory/LDAP as an ID repository, a role can contain Active Directory/LDAP user accounts and groups.
Entries matching the string you type are displayed.
Select the check box associated with the user, group, or role you want to add, then click Add.
You must select a universal or security group. Local or distribution groups are not supported.
If you are using Active Directory/LDAP as an identity store, all of the matching user accounts and groups in the Users container that can be seen in the domain or forest are displayed.
See Authenticate users in multiple domains for more information on which domains can be seen.
After you add an Active Directory/LDAP user or group to a role, the name is shown on the Users page only after the user logs in to the User Portal or enrolls a device.
- Click Save.
Remove members from a role
When you remove users or Active Directory/LDAP groups from a role, any administrative rights or applications assigned to that role will no longer apply to those users. For example, if you have assigned the Box application to the role ABC, then users removed from that role will no longer have SSO access to Box.
- In the Admin Portal, click Core Services > Roles.
- Click the role.
- Click Members.
Click the check box for each member you want to remove.
The Add button is replaced by an Actions button.
- From the Actions drop-down menu, click Delete.
- Click Save.
It is a best practice to secure your default administrator account by using your own personal account to administer CyberArk Identity. Assigning domain users or groups to the System Administrator role allows you to log in to CyberArk Identity with domain credentials. This also allows you to centrally manage CyberArk administrator access through Active Directory. If you do not have Active Directory, you can add users from LDAP, Google Workspace, or create users in the CyberArk Directory.
To assign domain users or groups to role
- Log in to the Admin Portal using the credentials provided in your welcome email.
- Click Core Services > Roles.
- Click the System Administrator role.
- Click Members > Add button.
Search for the relevant domain user(s) and/or group(s) you want to grant administrative rights to the Admin Portal.
The domain user should NOT match your Active Directory user name.
The Add Members page closes.
You can now log in with your domain credentials to the Admin Portal.