Skip to main content
Matrix42 Self-Service Help Center

User Management

Create, update and delete user profiles and groups.

Overview

Your FireScope appliance has two Admin User accounts, one for the FireScope SPM interface and one for the Configuration Management Interface (CMI). The Admin User is a reserved and restricted FireScope Administrator that has accessibility of all privileges granted to User Groups but cannot be a member of any groups. This user should perform administration and configuration tasks but not as an actual user.

These two Admin User accounts are separate for security purposes. The default password to both of these accounts is password. FireScope recommends that you change the passwords for both Admin accounts to two different passwords at your earliest convenience.

User Access Level

FireScope SPM has several access levels to allow your users the necessary accessibility for their assigned tasks.

The access roles from least access to most access are as follows:

  • Dashboard User
  • Services Supervisor
  • Services Manager
  • Configuration Administrator
  • FireScope Administrator
  • Account Administrator

Dashboard User

Dashboard users are restricted to the Dashboard Pages only. Lens content accessibility is restricted to associated Logical or Service Groups, based on User Group membership. Although the Users cannot create reports, they can access reports shared based on User Group membership (or public reports). They can create their own Dashboard Pages and Spaces. For Trend Graph or Pie/Bar charts, Dashboard users can also create their own graphs from accessible CI Attributes.

Services Supervisor

Services Supervisor have all the access of Dashboard users plus access to Service Management and Analysis sections of the application. Some Dashboard content will also provide additional contextual links to allow further analysis your issues or services. In addition to services and analysis views, supervisor users can create and manage their own reports. CI access is based on user group membership.

Services Manager

Services Manager user have access to Dashboard, Analysis, Service Management, and Service based Configuration (Service Groups, Policy, etc) but not device level Configuration (CI).

Configuration Administrator

Configuration Administrator have the ability to edit the configuration of your CIs, Visual Controls and other Data Collection or Data presentation settings. CI access is based on user group membership.

FireScope Administrator

FireScope Administrator have the ability  to edit settings that affects users, groups or properties that has impact on accessibility. Batch configuration functions such as Blueprint linkage and Migrate CIs requires this level of access. FireScope Administrators has access to all Service GroupsLogical Groups and CIs. They can also administer other users’ Dashboards and Reports.

Account Administrator

Global Settings that affects all configurations and evaluations within the account requires this level of access. Limit this user access level to those you wish to conduct global setting configurations only. Account Administrators have access to all Service Groups, Logical Groups and CIs. This level of access can also administer other users’ Dashboards and Reports.

Dashboard

 
Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
View Dashboard
Pages
Spaces

Service Management

Business Services

Dashboard
Only
Services
Supervisor
 
Services
Manager
Configuration
Administrator
 
Firescope
Administrator
Account
Administrator
Service Policy Status
X
Service Explorer
X
Service Dependency Maps
X
Service Level Agreement
X
SLA Projection
X

Events

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Recent Events
X
Recent Event Timeline
X
Policy Event Timeline
X
Notification
X
Incident Management
X

Storage Management

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Overview
X
Usage
X
Infrastructure
X

Virtual/Cloud

Dashboard
Only
Services
Supervisor
  
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Amazon AWS Infrastructure
X
VMWare Infrastracture
X
VMWare Explorer
X

Network

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Explorer
X
Port Visualizer
X
Port Details
X
Infoblox Grid Management
X
Infoblox IPAM Explorer
X
 

User Experience Check

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Web
X
User Experience Check
X
ServiceNow
Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
ServiceNow Statistics
X

Analysis

CI Analysis

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
CI Quick View
X
Latest Data
X
CI Profile Overview
X

Visualization Analysis

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Data Center View
X
Virtual Controls
X
Historical Trend View
X
Graphic Data Analysis
X

Maps

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
 
Firescope
Administrator
Account
Administrator
Custom Maps
X
Google Maps
X
Data Center Google Map
X

Logs

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
SNMP Traps
X
Syslog
X
Window Log
X
Log Attribute
X

Reports

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Quick Start Report
X
Manage Reports
X
Schedule Report
X
Firescope Analytics
X

Infrastructure

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Cisco UCS Report
X
Flexpod for Vmware
X
Rack Infrastructure
X

Cloud Migration

Dashboard only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Risk Analysis
X

Configuration

CIs

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
CI
X
X
Attribute
X
X
X
Attribute Set
X
X
X
User Experience Check
X
X
X
ESB
X
X
X

Group

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Logical Group
X
X
Service Management
X
X
Tag Management
X
X
X

Evaluation

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Event Definition
X
X
AED
X
X
Policies
X
X
Notification
X
X
Dependencies
X
X
Maintenance Window
X
X
X
Service Level Agreement
X
X

Service Dependency

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Dependency Editor
X
X
X
X
Network Traffic
X
X
X
X
Network URLs
X
X
X
X
Network Destination
X
X
X
X

Discovery

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Network Discovery
X
X
X
X
Manage Clusters
X
X
X
X
Topology Discovery
X
X
X
X
Virtual Discovery
X
X
X
X
Storage Discovery
X
X
X
X
Amazon AWS Discovery
X
X
X
X
Cisco UCS Discovery
X
X
X
X
Infoblox Discovery
X
X
X
X
SMI-S Discovery
X
X
X
X
Credential Management
X
X
X
X

Virtualization

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Visual Control
X
X
CI MultiView
X
X
Performance Grid
X
X

Map & Infrastructure

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Custom Map
X
X
Google Maps
X
X
Icons and Images
X
X
Facilities
X
X
Racks
X
X
FlexPod for Vmware
X
X

Blueprint

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Ci
X
X
X
Attribute
X
X
X
Attribute Set
X
X
X
Event Definition
X
X
X
Visual Control
X
X
X
Blueprint Group
X
X
X

Administration

Permission

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Users
X
X
X
X
User Group
X
X
X
X
AD User Configuration
X
X
X
X
X
External Authentication
X
X
X
X
X

Application Settings

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Ci Type
X
X
X
X
X
Data Retention
X
X
X
X
X
Google Map Key
X
X
X
X
X
Locale
X
X
X
X
X
Service Rules Settings
X
X
X
X
X
Severity Colors
X
X
X
X
X
Syslog Facilities
X
X
X
X
X
Syslog Priorities
X
X
X
X
X
Theme Management
X
X
X
X
X
Value Translation
X
X
X
X
X

Utilities

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Agent Management
X
X
X
X
X
Agent Upgrades
X
X
X
X
X
Edge Device
X
X
X
X
X
Blueprint Linkage
X
X
X
X
Service Modeler
X
X
X
X
Export
X
X
X
X
Import
X
X
X
X
Migrate CIs
X
X
X
X

Integration

Dashboard
Only
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Integration Information
X
X
X
X
Service Now
X
X
X
X
Cherwell
X
X
X
X
Landesk
X
X
X
X

System Reports

Dashboard
Only
 
Services
Supervisor
Services
Manager
Configuration
Administrator
Firescope
Administrator
Account
Administrator
Audit Log
X
X
X
X
Administrative Notification
X
X
X
X
Edge Device Scorecard
X
X
X
X
System Messages
X
X
X
X
Config and Usage Statistics
X
X
X
X

Create, Update and Delete SPM User

Create a SPM User:

  1. Log in to FireScope SPM as a FireScope Administrator.
  2. Click Administration > Permissions > Users. The Users page will be displayed with list of the current Users, their access level, user group(s) and online status.
  3. Click on the Create button(on the upper, right side of the page). The Create User page will be displayed.
clipboard_ec939a6fb3a8f1616998b8525b14d772a.png
  1. Complete the form.
  2. Click on the Save button.                                                                 

 User Profile

Alias (Login Name) User name used to log into SPM.
Name User’s first name.
Surname User’s last name.
Password User’s password to log in to SPM.

User Locale

Language  Preferred language used in the SPM user interface.
Time Zone & Date Format The settings here are used to interpret the time displayed for data history, events, and all time related displays.

Contact Media

Contact Media This is the contact SPM will use to contact the user in case of an event. You can configure multiple contact methods for a user, and for each contact method, you can detail hours of the day to use this method as well as filter the severity of events that trigger notifications.

 User Access Level

User Access Level Defines what this user can access in SPM.
User Access LevelAvailable MenusAccount AdministratorHighest level user access; access to all global Administration optionsFireScope AdministratorHas access to common administrative tasks,except for access to global account controlsConfiguration AdministratorDashboard, Service Management, Analysis, ConfigurationServices SupervisorDashboard, Service Management, AnalysisDashboard User OnlyDashboard
User Groups User Groups this user will be associated with. The primary purpose of User Groups is to define what assets this user can manage. Select the User Group names and use the Add and Remove buttons to configure User Groups for this user.

Application Settings

Default location Default page displayed when this user logs in.
Auto-logout How many seconds of inactivity will trigger this user’s session to be automatically logged out. To disable automatic logout, check the Never box.
Refresh Default polling period to refresh data in SPM interface items.You can override this value for Dashboard Lenses by adjusting their individual settings.
Related Events and Display Types Options – Event type (Shown in Non-Dashboard) You choose to only show failed, ok, or unknown events only. In some views, unknown events are counted as failed as well. You can override this value for Dashboard Lenses by adjusting their individual settings.
Global style setting for ‘corrected’ event display style Options “with strike-through”  OR “regular text”Sets how to display ‘corrected’ events. with strike-through Place a line through the event; this is useful for color blind users and emphasizes the failed events.

Update a SPM User:

Refer to Create User for Screen Shots#  Log in to FireScope SPM as a FireScope Administrator.

  1. Click Administration > Permissions > Users. The Users page will be displayed with list of the current Users, their access leveluser group(s) and online status.
  2. Click on User’s Alias (Login Name). Edit User page will be displayed.
  3. Add, delete or update the User information.
  4. Click on the Save button. 

Delete a SPM User:

Note: Deleting a User consists a some considerations.# If this User is Active Directory created, deleting this user will simply cause the user to be recreated in the next synchronization.

  1. Determine the reassignment of any objects that may belong to this user. For example, you may choose to reassign ownership and persist and pass control to another user.
  2. Below is the reassignment screen you will see after clicking delete on an individual User’s Configuration form. (not from the grid)
clipboard_e52e742550ebdb76ad79aea1bc8eff098.png

User Groups

User Groups are used to manage access for a group of Users. They are commonly used to represent a team within an organization that shares common responsibilities or tasks related to managing the IT assets.While User Group membership determines which assets are accessible to Users, User Access Level(link) determines the level of access rights (read-only, read-write) the user has to those assets.

 User Groups linked to a Service Group – will allow users access to all Logical GroupsCIs and related elements (AttributesEvent DefinitionsEvents, etc) under that Service Group & its Logical Groups.

 User Groups linked to a Logical Group – will allow users access to all CIs and related elements (AttributesEvent DefinitionsEvents, etc) under that Logical Group.

 User Groups linked to a Blueprint Group – will allow users access to view and edit Blueprint Groups and their associated Blueprint elements.

Creating and Managing a User Group

 Note: Although users can belong to more than one User Group, it is easier to manage permissions by NOT overlapping User and Group memberships with complex Service and Logical Group assignments.# Log in to FireScope SPM as a FireScope or Account Administrator.

  1. Click Administration > Permissions > User Groups. The User Groups page will be displayed with list of the current User Groups.
clipboard_ef4b837ae628843200847ae286d043e26.png
  1. Click on the Create button. Create User Groups page will be displayed.
clipboard_e8f06d76e3d691d21dd9b95f077aeb266.png
  1. Group Name: Create your user groups to organize asset access.
  2. Users: Select which groups this new user will be associated with for access to assets. User group assignment also determine visibility to group shared dashboard pages.
  3. Service Group/Logical Group
    • User groups linked to a Service Group – will allow users access to all Logical Groups, CIs and related elements (attributes, event definitions, events, etc) under that Service Group & its Logical Groups.
    • User groups linked to a Logical Group – will allow users access to all CIs and related elements (attributes, event definitions, events, etc) under that Logical Group.
  4. Blueprint Group:
    • User groups linked to a Blueprint Group – will allow users access to view and edit Blueprint Groups and their associated Blueprint elements.
  5. Click on the Save button.

External Authentication(SAML)

If you have SAML Identity Provider or Windows Active Directory deployed in your organization for user access management, you can utilize SPM External Authentication to use the same Credentials as the organization’s login Credentials. 

To Select a Method of Authentication: # Login in to Firescope SPM as an Account Administrator.

  1. Click on Administrator > Permissions > External Authentication. External Authentication page will be displayed.
clipboard_eee862d906f3baf998dbb6e4b32bdc53e.png
  1. Select the Authentication Method from the drop down list. For more information on each method refer to Authentication Methods section.
  2. Complete the form.
  3. Click on Enable and Save button.

Authentication Methods

  1. Local Authentication OnlyThis is the default Authentication method. It authenticates against local Users only. This method does not require any type of integration with other authentication sources or organizations within the company. 
clipboard_ed7398fb5a870273fff6f3f68cdd10f87.png
  1. Active Directory Authentication
    This is a method that authenticates against local Users and Windows Active Directory. This method requires SPM cloud to have access to the Windows Active Directory to verify user credentials. It also requires configuration provided by Active Directory and Users should be already imported through AD User Configuration. The Active Directory may be provided by a different organization within your company.
clipboard_e1c62cd2dbc0e320c45622663f67023df.png
  1. SAML AuthenticationThis is a method that authenticates against local Users and SAML. SAML authentication is a method that authenticate Users against a remote service, know as a SAML Identity Provider (IdP), instead of authenticating against SPM which is considered to be the SAML Service Provider (SP). SAML Identity Provider may be provided by a different organization within the company.
    Successful SAML authentication requires following:
    • SPM cloud to have access to your SAML Identity Provider.
    • Configuration and exchange of SAML metadata between SPM and your SAML Identity Provider.
    • Changes to the customer’s authentication server (idP ie PingID) and to the customer’s account in SPM (SP).
clipboard_edf587fbf4b432b730c95e3ac42eeede3.png

Select the SAML Authentication method from the drop down list on External Authentication page. SAML Authentication page will be displayed. This page has three sections which are explained below.# Remote Identity Provider(IdP) –  This information must be provided by your Remote Identity Provider. Coordinate SAML configuration with your Remote Identity Provider. For more information on the fields refer to the Section Description Table 1 below. Section Description Table 1

Entity ID URL (Metadata) Identifier of the IdP entity
Single Sign On Service URL (SSO) URL Target of the IdP where the SP will send the Authentication Request Message
Log Out Service URL
Single Log Out Service URL (SLO)URL of the IdP where the SP will send the SLO RequestLog Out Redirect URLURL where the SP will perform a simple non-SAML redirect
 
X.509 Certificate IdP public certificate used in verifying signed SAML responses
  1. Local Service Provider(SP) – SAML configuration must be provided to your Remote Identity Provider and must match your Remote Identity Provider configuration. Coordinate SAML configuration with your Remote Identity Provider. This information is provided by SPM. For more information on the fields refer to the Section Description Table 2 below.
clipboard_e46df33529f6ce70d7d78d865b29c23cd.png

Section Description Table 2

Entity ID URL (Metadata) Identifier of the SP entity
User Alias Mapping Enter the SAML attribute which maps to a SPM user Alias, such as NameId or User.sAMAccount
NameID Format Format of the name identifier to be used in SAM requests and responses
Single Log Out Service URL (SLS) URL where the IdP will issue a log out request to SPM
Assertion Consumer Services URL(ACS) URL where the response from the IdP will be returned
X.509 Certificate IdP public certificate used in verifying signed SAML responses
  1. Options – This section has additional SAML configuration which must match your Remote Identity Provider configuration.Coordinate SAML configuration with your Remote Identity Provider. For more information on the fields refer to the Section Description Table 3 below.Section Description Table 3
 Sign Requests/Response
Authn Requests SignedSP Specified user authentication mechanism to request the IdP to use for user authenticationLogout Request SignedThe logout Request messages sent by this SP will be signedLogout Response Signed The logout Response messages sent by this SP will be signedSign MetadataThe Metadata provided by this SP will be signedMessages SignedRequire the Response, LogoutRequest and LogoutResponse received by this SP to be signedAssertions SignedRequire the Assertion elements received by this SP to signed
 
Authentication Context  SP specified user authentication mechanism to request the IdP to use for user authentication
Signature Algorithm Algorithm that will be used for signing

Configuring SAML with ADFS

The following guide explains the key settings required to setup SAML authentication using ADFS

Prerequisites:* ADFS 2.0 / 3.0

  • FireScope Edge must be able to connect via LDAP to a domain controller
  • FireScope Cloud must be able to connect to your ADFS server (Authentication is performed between FireScope web servers and ADFS)

  # First import the users that will be using FireScope using the AD Import feature at Administration menu à AD User Configuration.

  1. Create the Relying Trust Party in ADFS. We recommend having a browser window open, connected to FireScope and with the Administration à External Authentication page open, with SAML Authentication selected.
    1. Choose import data about the relying party published online. Use the url in the Entity ID URL (Metadata) field in the Local Service Provider section in the FireScope interface.
    2. Follow the wizard, be sure to select “Select Permit all users to access the relying party”
  2. Add a Rule in the Issuance Transform Rules tab. Add NameID as “Claim rule name”, choose “Active Directory” as Attribute store, choose “SAM-Account-Name” as LDAP Attribute and “Name ID” (Space between Name and ID) as “Outgoing claim type.”
  3. In the ADFS management console, click the Certificatesfolder and double-click on the Token Signing certificate, then Click the Details tab and the Button Copy To File. Export the certificate as Base-64 encoded X.509
  4. Open the exported file in a text editor and copy the content, paste into the X.509 Certificate field in the Remote Identity Provider section in the FireScope interface.
  5. Set the following fields to complete the FireScope side of the SAML integration:
Field Sample Value Notes
Entity ID URL http:// [your-adfs-server.domain.com].com/adfs/services/trust If you’re not sure what your Entity ID URL is, go to https://[your-adfs-domain.com]/FederationMetadata/2007-06/FederationMetadata.xml one of the first elements in this document is your Entity ID URL
Single Sign On Service URL (SSO) https://[your-adfs-server.domain.com] /adfs/ls/IdpInitiatedSignOn.aspx?LoginToRp=https://[yourFireScopeInstance].firescope.com  
Single Log Out Service URL (SLO) Optional  
Log Out Redirect URL Optional  
User Alias Mapping NameID  
ADFS – Lower case URL-Encoding Should be checked  
Authentication Context None  
Signature Algorithm SHA-256  

Finally, visit the home page of your instance of FireScope, fill in your account name and leave username and password blank.  Click on Enter and you should be re-directed to your ADFS server to complete authentication.

Common Errors

Invalid issuer in the Assertion/Response

Check that you have the correct Entity ID URL, and also verify that you are using the appropriate http or https at the beginning.

NameID was not in the Assertion Response

Check your claim rule and make sure you are sending SAM-Account-Name matched to Name ID.

User was not found

Check to make sure that you have imported users through the Administration menu à AD User Configuration page in FireScope. This should be in active status, and you can validate the correct users are created by checking the Users page.  AD imported users are noted with a “synced from AD” message immediately beneath the user’s name.

AD User Configuration

SPM allows the user to configure access to Windows AD from a deployed Edge device which provides users a more secure method to access user information to setup accounts in SPM cloud. The connection is assigned to a single Edge device which is already deployed within the user’s network and utilizes an already open connection between the Edge device and the SPM cloud to deliver the user data.

Note: Make sure the AD account user you enter here has visibility to the users you wish to import.# Log in to FireScope SPM as a Account Administrator.

  1. Click Administration > Permissions > AD User Configuration. The Users Configuration page will be displayed.
clipboard_e78c46d1b00493ae1c1881eb6039d8fe0.png
  1. Complete the form, for more information refer to the Section Description Table below.
  2. Click on Save button.

Note: If a user is matched on more than one filter, their user account will have the highest level of permissions.

Section Description Table

Section Description
Edge Device Select an Edge Device to designate the data collection or operation target.
Change Edge Device

Click on the Change Edge Devicebutton to select an Edge Device.

Note:Changing the Edge device setting will require configuration update to move the access to your data from one Edge to another.

Windows AD Connection

AD Server: Your internal AD server such as 'ad.company.com' or '10.0.0.123'.

Port: Default port is 389

Domain: Your Domain, often the text following the @ in your email, such as company.com

Account User: User used to find other users in AD. User must have permission to the provided Server, Domain, and User Group.Do not include your domain again i.e. text after (and including) the @ symbol

Password: Enter New Password

Import Users

Status: You can select the status(Enabled or Disable)from the drop down list.

Mode: You can create active directory query filter and user assignment rules to process users as they are imported into SPM.  The Preview Results Only mode lets you review the results without actually creating or updating Users.You can change the Mode to Import Users in Results once you have the expected results.

Frequency or Run Once: You can schedule import configuration by entering frequency time in minutes or check the Run Once on Save check box to run it only once. 

Last check displays the date and time of last configuration.

AD User Group: This is the actual location of the User; The full baseDN path to the main user group.  ‘CN=Users,DC=companyname,DC=int’

Query Filter: This is utilized to narrow the user list down to the ones you wish to import with this rule.—- “(sAMAccountName=*)(mail=*)(sn=*)(givenName=*)” portion of the query is required to retrieve  valid users.
How-to guide on writing filters: https://technet.microsoft.com/en-us/library/aa996205(v=exchg.65).aspx
   Note: Consult your security administrator and test the search filters with AD administrative tools before trying it in SPM.
   Note 2: Useful for getting membership of nested user groups is the bolded OID in the following example:
  (memberOf:1.2.840.113556.1.4.1941:=cn=Test,ou=East,dc=Domain,dc=com) 

User Access Level: You can select the user access level for the imported or updated user from the drop down list. If the user is part of multiple rule results, the highest level will be granted. 

User Group: You can select the user group of which the imported or updated user will become a member. 
   Note: This is additive only. An update will NOT remove the user from any group when a user does NOT match a user group assignment

Last Scan Summary: Displays the record of updated and imported users. Click on the Results to see detailed view.

Remove: You can delete the Rules by clicking on the X.

  • Was this article helpful?