How to configure different role permissions for sub-account

AnyViewer Posted By @AnyViewer May 28, 2024

The role-based permissions feature of AnyViewer Enterprise Edition is crucial for precise management, rational allocation of permissions, and information security within an organization. Administrators can use the role and permissions functionality to create sub-account role groups for employees at various levels and set corresponding permissions for each group.

This feature can be effectively utilized in the following scenarios: by assigning specific role-based permissions, you can restrict sub-accounts under different roles to access and operate only certain functions, preventing unauthorized access and potential data breaches.

For example, sub-accounts in the finance department can only remotely access computers in the finance department, while sub-accounts for technical support can only access computers in the technical support department. For temporary projects or short-term tasks, temporary roles can be created and assigned corresponding permissions. Once the task is completed, these permissions should be promptly revoked to avoid long-term security risks.

How to Create a New Role

The Any viewer Enterprise Edition management center provides a detailed list of two major modules: Device Management and User Management. Let's learn more about it.

When you add a sub-account successfully, the account will be listed in the Use Management-Member list, where you can change the role.

Change User Role Perumission

If you want to add new role. You can click Use Management-Role Permission to create a new role.

Create New Role

In this Role permission page, you can also edit the role name, permission settings and delete the role in this step.

Modify Role Name

How to Configure Role Permissions from Sub-account

Enterprise Edition now allows you to configure different permission for sub-account user, including user management, device management and controllable devices.

User Management permission

three types of permissions can be set: no permission, view permission, and administrator permission. You can set whether sub-account user under a role have right to access to the User Management page, add sub-account, modify member notes, removing members, creating new roles, or edit role permission.

No permission: if you check this options, the Management Center interface will hide Member List page and Role Permission Page.

View permission: you can view Member List page and Role Permission Page.

Administrator permission: sub-account user under this role have permission to add sub-account, modify member notes, removing members, creating new roles, and edit role permission

Device Management

it also includes such three options. You can set whether the sub-account user under a role have right to access the Device Management page, or move/delete the deices and so on.

No permission: if you check this options, the Management Center interface will hide Device List page and Application list Page, only list the deployment device list page.

View permission: sub-accounts under this role can view Device List page and the Deployment device list page, and they can deploy device and download the MSI package. But the application list page can be hidden.

Administrator permission: sub-accounts under this role can create/delete/rename groups, or delete controllable devices/move controllable devices groups, and approve application lists.

Controllable equipment

Sub-account users need to add devices to the corresponding role, then Sub-accounts under the corresponding roles can  remotely control these devices or manage the devices of each department accordingly. If devices are not added to the corresponding role, when you log in to a sub-account under that role in the AnyViewer program, the devices that have not been added will not appear in the "My Devices" list.

Permission Setting

In conclusion, Enterprise Edition is committed to providing enterprise organizations with more efficient and secure remote desktop solutions, through various measures to enable business managers to rapidly deploy and efficiently manage remote devices within the enterprise. To provide strong support for enterprise information security, and help further improve the enterprise data security architecture.