Managing roles

Roles overview

In the context of Tanium™ role-based access control (RBAC), a role assigns grant permissions to specify allowed activities, or deny permissions to specify prohibited activities. You assign roles to users, user groups, and personas to control what users can see and do in the Tanium Core Platform.

If you plan to import users and user groups from a Lightweight Directory Access Protocol (LDAP) or Active Directory (AD) server, do so before configuring or assigning roles. For details, see Integrating with LDAP servers.

The Tanium implementation of RBAC supports the following role categories, which are based on the types of permissions that they grant or deny:

Custom roles

Custom roles are roles that you create to grant or deny a combination of administration, platform content, and module permissions. See Configure a custom role.

Module roles

Module roles are pre-defined roles that grant or deny module permissions, which control access to module workbenches, features, and content sets. Some module permissions automatically enable additional provided permissions. For example, the Patch Module write permission automatically grants the Ask Dynamic Questions permission. You cannot edit or delete pre-defined module roles.

Advanced roles

Advanced roles are pre-defined legacy roles that grant or deny platform content permissions, which control access to sensors, packages, saved questions, and other types of content that apply across all Tanium modules and shared services. You cannot edit or delete pre-defined advanced roles.

Reserved roles

The predefined reserved roles assign permissions that enable users to perform a range of tasks that are commonly grouped in many organizations. For example, organizations typically have a small set of users who oversee all Tanium operations and require the full administrative permissions that the Administrator reserved role provides. Reserved roles can include special permissions, such as managing the Tanium license, that are not available to non-reserved roles. ReservedIn addition to the special permissions, reserved roles can have some or all of the permissions associated with the other role categories. You cannot edit or delete reserved roles. For details, see Reserved roles.

The following figure shows the configurable components of the different role types, and the order in which you assign the components:

Figure  1:  Role configurations

For an overview of how roles relate to other RBAC configuration objects such as content sets, personas, users, user groups, and computer groups, see Tanium RBAC implementation and concepts.

Roles have a many-to-many relationship with users and user groups. For example, all Tanium Interact users can have the Interact Show module role, and each of those users can have additional custom roles that provide access to the sensors and questions that they use in Interact. Similarly, you can configure permissions for the same content set across multiple roles, and each role can specify permissions across multiple content sets.

As a best practice when configuring roles, take full advantage of their modularity and cumulative effect on user permissions. For example, instead of creating a single role with all the permissions that a particular user needs, and creating another role with only slightly different permissions for another user, create several roles with smaller but unique permissions sets. You can then mix and match these minimalistic roles among various users to achieve the same effective permissions as individual roles that have comprehensive permissions. For details, see Effective role permissions.

Some permissions that you assign to a role automatically provide additional permissions. For example, if you assign Package write permission, it implicitly provides Package read permission. For details, see Provided role permissions.

Users inherit roles from the user groups to which you assign those users. For details, see Inherited roles.

For a given Tanium Console session, only the permissions of the currently selected persona are available to a user, even if multiple personas are assigned to that user. For details, see Managing personas.

To add, edit, or delete roles, you must have the Administrator or Content Set Administrator reserved role or a custom role with the Permission Administrator permission. However, a Content Set Administrator cannot manage the assignment of personas or reserved roles to users and user groups.

Roles do not control access to computer management groups (see Manage computer management groups) or action groups (see Managing action groups) that users select for targeting when issuing questions or deploying actions. However, roles do control the permissions required to manage computer group and action group configurations.

Grant and deny roles

You can assign multiple grant and deny roles to a user or user group. TaaSThe Tanium Server bases the effective permissions of a user or group on the cumulative effect of all the roles that are assigned to that user or group: all permissions granted or implied, minus those explicitly denied.

You can view the effective permissions of a user or user group in the Tanium Console: see Effective role permissions.

In custom roles, a permission and content set in the deny role must match a permission and content set in the grant role to negate the grant permission. In the following example, the deny Package write permission on Content Set A matches the grant Package write permission on Content Set A, so the grant permission is negated.

Figure  2:  Grant and deny roles on content set permissions (match)

In the following example, the deny Package write permission on Content Set D does not match any grant permissions. Therefore, the deny permission has no impact on the effective permissions of the user.

Figure  3:  Grant and deny roles on content set permissions (no match)

When you assign content sets to permissions in custom roles, the Add all Content Sets that exist or will exist to the permissions option is equivalent to listing every content set. The following figure illustrates an example where the deny Package write permission on Content Set D has an effect.

Figure  4:  Add All Content Sets option

Grant and deny matching also applies to administration permissions. In the following example, the user has one grant role and two deny roles that specify administration permissions. TaaSThe Tanium Server factors out exact matches between grant and deny permissions. The user has all of the capabilities that the grant role specifies, minus the capabilities that the deny roles specify.

Figure  5:  Grant and deny roles on administration permissions

Provided role permissions

Some permissions automatically provide additional permissions because of dependencies. For example, the Package write permission that enables creating packages depends on the Package read permission that enables accessing the Packages page. Similarly, the Interact Execute action permission that enables action deployment depends on the Action write permission that enables action configuration.

In grant roles, every write permission implicitly provides the associated read permission. In the following example, the custom role that is assigned to Eric and Grace has the Package write permission on the specified content sets, and therefore the configuration does not need to specify the Package read permission. A role that has only the Package read permission on the same content set is created for users who must have read-only permissions, like Bob in this example.

Figure  6:  Eric and Grace effectively have both read and write permissions

Deny roles do not implicitly provide associated permissions. For deny roles to have an effect, they must explicitly specify permissions and those permissions must exactly match the permissions that a grant role specifies. For example, if a deny role specifies that Package write permission is denied on a content set, the role does not also deny Package read permission. In the following example, the deny role permissions do not exactly match any grant role permissions. Therefore, the deny role is disregarded and Bob still has Package read permission on the specified content sets.

Figure  7:  Bob effectively has read permissions

Some module permissions and platform content permissions implicitly provide additional permissions because of dependencies that are unrelated to read-write associations. For example, the Interact Execute action permission provides several additional permissions that are required to deploy and configure actions.

Figure  8:  Permission dependencies

Provided permission automatically apply to content set assignments. For example, if you assign the Action write permission to the Base content set, it automatically provides Package read permission for the Base content set. If you assign Sensor write permission to the Default content set, it automatically provides Sensor read permission for the Default content set.

The configuration pages for roles, users, user groups, and personas use different icons to distinguish between explicitly assigned and implicitly provided permissions. See Effective role permissions.

Inherited roles

Users inherit role permissions from their user groups. In the following example, Eric inherits permissions from the roles that are assigned to the NOC user group. He also has permissions that are assigned directly to his user account. TaaSThe Tanium Server enforces the net effect. In this example, even though Eric inherits the Isolated Subnets write permission and Separated Subnets write permission from the user group, the deny role that is assigned directly to his user account negates those permissions. Because no deny roles are assigned to the accounts of Bob and Grace, they have all the permissions that are inherited from the user group, including Isolated Subnets and Separated Subnets write permissions.

Figure  9:  Inherited roles

Reserved roles

The Tanium-defined reserved roles assign permissions for special-purpose capabilities, such as managing the Tanium license. Because these permissions are provided automatically, you cannot edit or delete them and they are not available to non-reserved roles. In addition to the special permissions, reserved roles can have some or all of the permissions associated with other roles. Special logic applies when you assign both a reserved role and non-reserved role to a user or user group, as described in the following sections.

Admin reserved role

The Admin reserved role has all permissions to all content, modules, shared services, and administrative functionality. When you assign this role, other grant roles are superfluous and deny roles  are ineffective, with the following exceptions:

  • Bypass Action Approval: A custom role with the Bypass Action Approval permission does have effect when it is assigned to a user who has the Admin reserved role. The Admin reserved role does not have this permission by default. Due to the sensitive nature of bypassing approval, you must explicitly assign this permission in all cases.
  • Deny All: The Deny All reserved role negates all the permissions of the Admin reserved role.

During the setup of your Tanium as a Service (TaaS) deployment, an initial administrator account is created with the Admin role. You can use this account to configure RBAC for all other users, including other users who might need the Admin role.

Figure  10:  Admin reserved role

Administrator reserved role

The Administrator role has all permissions to all content, modules, and administrative functionality. When you assign this role, other grant roles are superfluous and deny roles are ineffective, with the following exceptions:

  • Bypass Action Approval: An advanced role with the Bypass Action Approval permission does have effect when it is assigned to a user who has the Administrator reserved role. The Administrator reserved role does not have this permission by default. Due to the sensitive nature of bypassing approval, you must explicitly assign this permission in all cases.
  • Deny All: The Deny All reserved role negates all the permissions of the Administrator reserved role.
Figure  11:  Administrator reserved role

Content Set Administrator reserved role

The Content Set Administrator role assigns permissions to read and write content set and role configurations, including role assignments within user and user group configurations. This role makes all other grant roles superfluous. The Deny All reserved role is the only role that can affect a user who has the Content Set Administrator role.

Figure  12:  Content Set Administrator reserved role

Notice the result when both the Content Set Administrator and Administrator roles are assigned. Only the Content Set Administrator role remains effective. Be careful not to assign the Content Set Administrator role to users who must have other roles. Be careful not to assign (directly or by user group inheritance) the Content Set Administrator role to users who are assigned the Administrator role.

Content Administrator reserved role

The Content Administrator role grants read and write permissions for all content across all content sets, as well as action management permissions. When the Tanium Server evaluates effective permissions for a user who has the Content Administrator role, the server disregards the content permissions in other roles but evaluates other types of permissions.

Figure  13:  Content Administrator reserved role

Deny All reserved role

Users who have the Deny All role cannot access anything in the Tanium Core Platform, regardless of any other role that you assign to them, including the Administrator reserved role. In the following example, the only role assigned to Frank that has any effect is Deny All.

Figure  14:  Deny All

Tasks that require reserved roles

To perform the following tasks, a user must have a reserved role because the tasks are not associated with administration permissions that you can assign to custom roles.

 Table 1: Tasks requiring a reserved role
Task Administrator Content Administrator Content Set Administrator
Manage content sets

Create, edit, or delete content set configurations.

Check mark X Check mark
Manage role configurations and assignments

Edit roles and edit the role assignments of users, user groups, and personas.

Check mark X Check mark
Manage Tanium solutions

Manage Tanium solutions (modules, shared services, and content packs) on the Administration > Configuration > Solutions page.

Users can still import solutions if they have a role with the Import Signed Content permission and export solutions if they have a role with the Export Content permission.

Check mark X X
Manage Tanium Core Platform configuration

View or manage many of the Administration > Configuration pages, including those for proxy settings, logging levels, plugins, plugin schedules, sensor threshold indicators, package file repository, Tanium licenses, Tanium root keys, trust among Tanium Core Platform servers, LDAP servers, SAML, and Tanium Console customizations.

Check mark X X
Manage Interact categories

Read and manage the Other Dashboards category.

Check mark Check mark X

Effective role permissions

The effective permissions of a user are based on the cumulative effect of all the assigned and inherited roles, including the following:

  • Permissions specified in grant roles minus permissions specified in deny roles
  • Implied permissions in grant roles
  • Roles that are assigned to the persona that a user selects for a Tanium Console session
  • Roles inherited from a persona that is assigned to user groups, after the user selects that persona for a Tanium Console session

In the user and user group configuration pages, the Permissions section uses the following icons to indicate effective permissions:

Explicit permission Grant permission that you must explicitly assign.
Super explicit permission Grant permission that you must explicitly assign and that automatically provides additional permissions because of dependencies. For example, when you assign the Interact Module write permission, it automatically provides the Ask Dynamic Questions permission. See Provided role permissions.
Super explicit permission Deny permission.
Figure  15:  Effective permissions

The user and user group configuration pages list the Admin reserved roleAdministrator, Content Administrator, and Content Set Administrator reserved roles under Global Permissions if you assign that role. However, when you view the configuration page for a custom role in Edit Mode, the Global Permissions are hidden because you cannot assign them.

You can expand Expand each of the module content permissions, Platform Content Permissions, and Global Permissions to list the content sets to which the permission applies:

Explicit permission Content set that is explicitly assigned to the permission.
Super explicit permission Content set that is assigned because another permission implicitly provides it.

The configuration pages for users, user groups, and personas also list the assigned Content Sets by content type. For implicitly provided permissions Implied Permission, hover over the icon to show a tool tip that indicates how the permission was derived from an explicit permission Super explicit permission.

Figure  16:  Permission-content set assignments

To review effective permissions:

View role details

  1. From the Main menu, go to Administration > Permissions > Roles.

    The page displays each role name and category, and the number of users, user groups, and personas to which each role is assigned. The Total Users column indicates the sum of all the users who are assigned the role through their user accounts or who inherit the role from user groups.

  2. (Optional) To display attributes that the grid hides by default, click Customize Columns Customize columns and select the attributes.
  3. (Optional) Use the filters to find specific roles:
    • Filter by text: To filter the grid by column values, enter a text string in the Filter items field.
    • Filter by attribute: Filter the grid by one or more attributes, such as the Role Name. Expand the ExpandFilters section, click Add Add, select an attribute and operator, enter a text string that contains all or part of the attribute value, and click Apply. If you add multiple attribute filters, the Boolean AND operator applies. After you finish specifying attributes, click Apply All to filter the grid.
  4. (Optional) To see the permissions, personas, users, and user groups that are assigned to a role, click the Role Name.

    To view or edit the configuration of an assigned user or user group, click the user or group name.

Configure a custom role

Create or edit a custom role that assigns administration, platform content, and module permissions.

  1. From the Main menu, go to Administration > Permissions > Roles.
  2. Perform one of the following steps:
    • To create a role, click New Role.
    • To edit a role, click a Role Name and click Edit Mode.
  3. Specify a Role Name to identify the role.
  4. Set the Permission Type to Allow (grant) or Deny.

    The Permissions section lists all the permissions that you can assign by clicking an icon in the Special, Read, Write, Execute, or Delete column. You can click an icon in a column header to select all the permissions of that type. For example, in the Administration permissions header, click the Special icon to assign all the available special administration permissions. The lists use gray icons to indicate unassigned permissions and the following colored icons to indicate assigned permissions:

    Explicit permissionPermission that you must explicitly assign.
    Super explicit permissionPermission that you must explicitly assign and that automatically provides additional permissions because of dependencies. See Provided role permissions.
    Implied PermissionPermission that is automatically enabled because another permission provides it.
    A later step in this procedure explains how to assign content sets to permissions that are associated with content.

    To assign roles to personas, see Manage role assignments for a persona.

  5. (Optional) To manage user assignments, expand Expand the Users section, click Manage Users, select or deselect users, and click Select.
    If you are editing a role that already has users assigned, click the number above the Users field in the Role Details section to scroll to the Users section and expand it.

    To view or edit the configuration of a particular user, click the user Name in the Users section. The Edit User page opens in a new tab.

  6. (Optional) To manage user groups assignments, expand Expand the User Groups section, click Manage User Groups, select the groups, and click Select.
    If you are editing a role that already has user groups assigned, click the number above the User Groups field in the Role Details section to scroll to the User Groups section and expand it.

    To view or edit the configuration of a particular group, click the group Name in the User Groups section. The Edit User Group page opens in a new tab.

  7. Expand Open the Administration section and select any of the following permissions that the role requires.

    To create a role that can perform all administrative tasks in the Tanium Console, assign the Permission Administrator permission and the write permissions for User, User Group, Computer Group, and Persona. The Admin reserved role has all these permissions.

     Table 2: Administration permissions
    PermissionDescription
    Permission AdministratorProvides the following administration permissions as a bundle:
    • Read permissions for User, User Group, Role, Persona, and Content Set
    • Write permissions for Role and Content Set
    • Grant permission for Role
    Action GroupRead permission enables users to view and export action group configurations in the Scheduled Actions page.

    Write permission enables users to create, edit, and delete action group configurations. Write permission provides the Action Group read permission.

    Allowed URLsRead permission enables users to view allowed URL configurations on the Allowed URLs page and to export the configurations in CSV format. The Export Content administrationmicro admin permission is required to export in JSON format.

    Write permission enables users to create, edit, and delete allowed URL configurations. Write permission provides Allowed URLs read permission.

    AuditRead permission enables users to view:
    • Last Sign In information on the Users page
    • Last Modified information on the user configuration page
    • Last Modification information on the Platform Settings page
    Computer GroupRead permission enables users to view computer management groups and export them in CSV format. The Export Content permission is required to export in JSON format.

    Additional permissions are required to view the user group, user, and persona assignments of computer management groups: see Manage computer management groups.

    Write permission enables users to create, edit, and delete computer management groups. Write permission provides the Computer Group read permission.

    To create a computer management group in which membership is based on a sensor filter, users require the following permissions in addition Computer Group write:

    • Sensor (platform content): Read permission on the Reserved content set, which includes content that is used to ask preview questions
    • Interact Module (module): Write permission

    Computer groups with manually defined membership do not require the Sensor read or Interact Module write permissions.

    Export ContentEnables users to export the following content types in JSON format:
    • Allowed URLs
    • Computer management groups
    • Content sets
    • Filter groups
    • Packages
    • Roles
    • Saved questions
    • Scheduled actions
    • Sensors

    Only the Administrator reserved role can export categories and dashboards.

    Import Signed ContentEnables users to import digitally signed content files into the Tanium Server.
    Global bandwidth throttlesRead permission enables users to view global bandwidth throttles on the Bandwidth Throttles page.

    Write permission enables users to create, edit, and delete global bandwidth throttles.

    Global SettingsRead permission enables users to view the global settings of Tanium Core Platform servers and Tanium Clients on the Platform Settings page.

    Write permission enables you to edit, create, or delete platformglobal settings. Write permission provides the Global Settings read permission.

    Isolated SubnetsRead permission enables users to view and export isolated client subnet configurations on the Administration > Configuration > Subnets page.

    Write permission enables users to create, edit, and delete isolated client subnet configurations. Write permission provides Isolated Subnets read permission.

    PersonaRead permission enables users to view and export persona configurations. The Permission Administrator permission provides the Persona read permission.

    Write permission enables users to create, edit, and delete personas when combined with the Permission Administrator permission. Write permission provides the Persona read permission.

    Users require additional permissions to edit the assignment of other RBAC objects (such as users) to personas: see Manage personas.

    Public KeyRead permission enables Tanium REST API users to download the Tanium public key (tanium.pub) or initialization file (tanium-init.dat).

    Only the Administrator reserved role can access the Infrastructure page to download those files through the Tanium Console.

    Question HistoryRead permission enables users to view the Question History page.

    To issue a question from the Question History page, users also require the following permissions:

    • Interact module permissions:

      • Interact show

      • Interact Module read

    • Platform Content Permissions:

      • Saved Question read permission on the content sets that contain the questions that the user is allowed to issue.

      • Sensor read permission on the content sets that contain the sensors that are used in the questions that the user is allowed to issue.

    Separated SubnetsRead permission enables users to view and export separated client subnet configurations on the Subnets page.

    Write permission enables users to create, edit, and delete isolated client subnet configurations. Write permission provides Separated Subnets red permission.

    Server StatusRead permission enables users to view the https://<Tanium_Server>/info page. For details, see View the info page.
    Subnet bandwidth throttlesRead permission enables users to view site-specific bandwidth throttles on the Bandwidth Throttles page.

    Write permission enables users to create, edit, and delete site-specific bandwidth throttles.

    Client StatusRead permission enables users to view the Client Status page.
    Token - RevokeEnables users to create or revoke API tokens that are used to access TaaSthe Tanium Server.
    Token - UseEnables users to send requests to the TaaSthe Tanium Server for new API tokens.
    Token - ViewEnables users to view the API Tokens page.
    UserRead permission enables users to view and export user configurations on the Users page.

    Write permission enables users to create, edit, and delete user configurations. Write permission provides User read permission.

    Additional permissions are required to view and edit the role, user group, and persona assignments of users: see Manage users.

    User GroupRead permission enables users to view and export user group configurations on the User Groups page.

    Write permission enables users to create, edit, and delete user group configurations. Write permission provides User Group read permission.

    Additional permissions are required to view and edit the role, user, and persona assignments of user groups: see Manage user groups.

    Management RightsRead permission enables users to view the computer management group assignments of users, user groups, and personas when combined with the Read Computer Group permission.

    Management Rights write permission is one of the permissions that are required to edit the computer management group assignments of users, user groups, and personas. For additional required permissions, see Manage computer management groups.

    Management Rights read and write are not explicit permissions; the Permission Administrator permission provides them.

    Content SetRead permission enables users to view content set configurations.

    Write permission enables users to:

    • Create, edit, and delete content sets
    • Move content between content sets
    • Export content sets in CSV format. The Export Content administration permission is required to export in JSON format.

    These are not explicit permissions; the Permission Administrator permission provides them.

    RoleRead permission enables users to view role configurations and export them in CSV format. The Export Content permission is required to export in JSON format.

    Write permission enables users to create, edit, and delete role configurations.

    Grant permission is one of the permissions that are required to edit the role assignments of users, user groups, and personas.

    These are not an explicit permissions; the Permission Administrator permission provides them.

    Users require the following combined permissions to manage role assignments:

    • Permission Administrator and User write permissions are required to edit the role assignments of users.
    • Permission Administrator and User Group write permissions are required to edit the role assignments of user groups.
    • Permission Administrator and Persona write permissions are required to edit the role assignments of personas.
  8. For each module that has permissions you want to assign, expand Open the <module name> section and select the permissions.

    See the module user guides for information about the required permissions for module-specific roles:

  9. Expand Open the Platform Content Permissions section and select any permissions that the role requires:
     Table 3: Platform content permissions
    PermissionDescription
    ActionAction read permission enables users to perform the following tasks on the Scheduled Actions, All Pending Approvals, and Action History pages:
    • View actions. The visibility of specific actions (grid rows) depends on Action read permission on the content set for the associated packages.

    • Export the actions in CSV format. The Export Content administration permission is required to export actions in JSON format.
    • Copy the actions to the clipboard.
    • View action status, when combined with other content permissions: see View action status.

    Action read and write permissions enable users to perform the following tasks on the Scheduled Actions, All Pending Approvals, and Action History pages:

    • Reissue or edit actions, when combined with Sensor read permissions on the Reserved content set. The Reserved content set includes content that is used to ask preview questions.

    • View the status of, and re-download, packages that are associated with actions.
    • Disable or enable actions.
    • Change the action groups that actions target.
    • Create copies of action configurations.
    • Delete actions.
    • Stop actions.

    Action read permission provides Own Action read permission.

    Action write permission provides Own Action read, Package read, and Show Preview permissions.

    Action for Saved QuestionWrite permission enables users to:
    • Access the Scheduled Actions page and see the actions they have deployed.
    • See and use the Deploy Action button on the Question Results grid for saved questions that have associated packages. The Package read permission is not required for the associated packages. If the saved question does not have associated packages, the Deploy Action button does not appear.

    Write permission provides Own Action read and Show Preview permissions.

    Use the Action for Saved Question write permission instead of the Action write permission to limit use by action users who use Tanium products to execute standard operating procedures that someone else created.

    Approve Action

    Enables users to perform the following tasks on the Actions I Can Approve page:

    • View actions that require approval. Users cannot view their own actions on this page.

    • Approve actions that other users own, when combined with Sensor read permission. Users cannot approve their own actions.
    • Export the actions in CSV format. Export Content (administration) permission is required to export actions in JSON format.
    • Copy the actions to the clipboard.
    Bypass Action ApprovalActions created by a user with this permission are not subject to approval requirements.

    No role, including the Administrator reserved role, includes this permission by default.

    This is the one platform content permission that has effect when granted to a user with the Administrator role.

    DashboardRead permission enables users to view dashboards in the Interact Content page, if those users also have Interact show permission. The users also require read permissions for Saved Question and Sensor on related content to use the dashboard.

    Write permission enables users to create, edit, and delete dashboard configurations. Write permission providesDashboard read permission.

    Dashboard GroupRead permission enables users to view categories in the Interact Content page, if those users also have Interact show permission. Users also require read permissions for Dashboard, Saved Question, and Sensor on the related content to use the category.

    Write permission enables users to create, modify, and delete category configurations. Write permission provides the Category read permission.

    Filter GroupRead permission enables users to:
    • View the Filter Groups page
    • Use filter groups for filtering questions, question results, and various lists in the Tanium Console
    • Export filter groups in CSV format. The Export Content administration permission is required to export in JSON format.

    Write permission enables users to create, edit, and delete filter group configurations. Write permission provides the Filter Group read permission.

    Own ActionEnables users to perform the following tasks on their own actions (not those of other users) on the Scheduled Actions, All Pending Approvals, and Action History pages:
    • View the actions.

    • Export the actions in CSV format. The Export Content administration permission is required to export actions in JSON format.
    • Copy the actions to the clipboard.
    • View action status, when combined with other content permissions: see View action status.

    The following permissions provide Own Action read permission:

    • Action read

    • Action write
    • Action for Saved Question write

    User cannot create their own actions unless they have Action write and Interact Module read permissions.

    PackageRead permission enables users to:
    • View packages in the Deployment Package list of the Action Deployment page.
    • View packages in the Packages page.
    • Export packages in CSV format. The Export Content administration permission is required to export in JSON format.

    Write permission enables users to create, edit, and delete package configurations. Write permission provides Package read and Show Preview permissions.

    Associated PackagesAssociated Packages read permission is not an explicit permission; the Action for Saved Question write permission provides Associated Packages read permission.
    PluginReserved for future use.
    Saved QuestionRead permission enables users to:
    • View saved questions in the Question Results grid drill-down and similar user interfaces.
    • View saved questions in the Interact Overview page, if the user also has Interact show permission.
    • Issue saved questions, if the user also has Sensor read permission on the content sets that contain the sensors in those questions.
    • View the Saved Questions page.
    • Export saved questions in CSV format. The Export Content administration permission is required to export in JSON format.

    Write permission enables users to create, edit, and delete saved question configurations. Write permission provides Saved Question read permission but does not provide Ask Dynamic Questions permission.

    SensorRead permission enables users to:
    • View sensor configurations.
    • View sensors in the Question Builder and similar user interfaces throughout the Tanium Console.
    • Use sensors in questions if the user also has the ability to ask questions.

    Write permission enables users to create, edit, and delete sensor configurations. Write permission providesSensor read and Show Preview permissions.

    Show PreviewShow Preview is not an explicit permission. The write permissions for Action, Action for Saved Question, Sensor, and Package provide Show Preview. Show Preview enables users to ask questions that are necessary to preview the impact of new and changed action, sensor, and package configurations. To ask preview questions, the user also needs Sensor read permission on the Reserved content set, which includes content that is used to ask the preview questions.
  10. (Optional) Review all the permissions that you selected.

    At the top right of the page, click Preview to display only the permissions that you selected. When you finish reviewing, click Edit Mode to continue configuring the role.

  11. Assign Content Sets to the pertinent module content permissions and Platform Content Permissions that you selected:
    • To assign all existing and future content sets to all the pertinent content permissions that you selected, select Add all Content Sets that exist or will exist to the permissions selected above. This option is useful, for example, when you want a user to always be able to read sensors or never be able to write actions.
    • To assign specific content sets to all the pertinent content permissions that you selected, click Add Content Sets, select the sets, and click Select.
    • To assign specific content sets to a specific permission:
      1. Scroll to the Permissions section and click the number beside the permission icon, such as:

        Content set assignments

      2. Select the content sets and click Select.

    To review the content set assignments for a specific permission, expand Expand it in the Permissions section. The following icons indicate how a content set permission is derived:

    Explicit permissionContent set that is explicitly assigned to the permission.
    Super explicit permissionContent set that is assigned because another permission provides it.

    To review the content set assignments for all permissions, see the Content Sets grid. The following grid icons indicate how a content set permission is derived:

    Explicit permissionContent set that you explicitly assigned.
    Super explicit permissionContent set that you explicitly assigned and that is associated with a permission that automatically provides additional permissions because of dependencies.
    Implied PermissionContent set that is automatically assigned because another permission provides it.

    To create a custom content set without leaving the role configuration page, click New Content Set, enter a Name to identify the set, and click Save.

  12. Click Save.

Manage user and user group assignments for a role

To assign roles to personas, see Manage role assignments for a persona.

  1. From the Main menu, go to Administration > Permissions > Roles and click the Role Name.
  2. Expand Expand the Users section, click Manage Users, select or deselect users, and click Select.
    If you are editing a role that already has users assigned, click the number above the Users field in the Role Details section to scroll to the Users section and expand it.

    To view or edit the configuration of a particular user, click the user Name in the Users section. The Edit User page opens in a new tab.

  3. Expand Expand the User Groups section, click Manage User Groups, select or deselect groups, and click Select.
    If you are editing a role that already has user groups assigned, click the number above the User Groups field in the Role Details section to scroll to the User Groups section and expand it.

    To view or edit the configuration of a particular user group, click the group Name in the User Groups section. The Edit User Group page opens in a new tab.

  4. Review the user and user group assignments, and then click Save.

Clone a role

To add a role that has many settings in common with an existing role, cloning the existing role and then modifying the clone is often a quicker method than configuring a new role. You can clone any role except the reserved roles.

  1. From the Main menu, go to Administration > Permissions > Roles.
  2. Select a role and click Clone.
  3. Enter a Role Name to identify the role, update the permissions as needed, and click Save.
  4. Assign users and user groups to the role (see Manage user and user group assignments for a role).

Export and import roles

The following procedures describe how to export and import the configurations of specific roles or all roles.

Develop and test content in your lab environment before importing that content into your production environment.

Export roles

Export roles as a CSV file to view their settings in an application that supports that format. If your user account has a role with the Export Content permission, you can also export roles as a JSON file to import them into another Tanium Server. The Administrator reserved role has that permission.

  1. From the Main menu, go to Administration > Permissions > Roles.
  2. Select rows in the grid to export only specific roles. If you want to export all roles, skip this step.
  3. Click Export Export.
  4. (Optional) Edit the default export File Name.

    The file suffix (.csv or .json) changes automatically based on the Format selection.

  5. Select an Export Data option: All roles in the grid or just the Selected roles.
  6. Select the file Format: JSON or CSV.
  7. Click Export.

    TaaSThe Tanium Server exports the file to the downloads folder on the system that you used to access the Tanium Console.

Import roles

You can import content files that are in JSON or XML format.

  1. (Non-Tanium-provided content only) Digitally sign the content file and ensure a public key is in place to validate the signature. See Authenticating content files.

    You do not have to generate keys or signatures for Tanium-provided solutions, such as the Default Computer Groups content pack. Tanium signs this content before making it available, and the associated public key is distributed to the Tanium Server key store during the server installation process.

  2. From the Main menu, go to any of the following Administration pages:
    • Configuration > Solutions
    • Permissions > Filter Groups
    • Under Content, select Sensors, Packages, or Saved Questions
    • Under Actions, select Scheduled Actions, All Pending Approvals, or Actions I Can Approve
  3. Select an Import option based on the source of the content:
    • Import > Import Files: Perform one of the following steps to select one or more files:
      • Drag and drop files from your file explorer.
      • Click Browse for File, select the files, and click Open.
    • Import > Import URL: Enter the URL in the Import URL field, and click Import.
  4. For each file, expand Expand the File name, review the content to import, and select resolutions for any conflicts with existing content (see Resolve conflicts when importing updates).
  5. If you want to overwrite existing content set assignments for all imported objects with the default Tanium-defined assignments, select Include content set overwrite. By default, the Include content set overwrite check box is deselected and the Tanium Server preserves the existing content set assignments.
  6. Click Begin Install.

Copy role configuration details

Copy information from the Roles page to your clipboard to paste the information into a message, text file, or spreadsheet. Each row in the grid is a comma-separated value string.

  1. From the Main menu, go to Administration > Permissions > Roles.
  2. Perform one of the following steps:
    • Copy row information: Select one or more rows and click Copy Copy.
    • Copy cell information: Hover over the cell, click Options Options, and click Copy Copy.

Delete a role

Deleting a role removes it from any user, user group, and persona to which it was assigned.

Perform the following tasks before deleting a role:
  1. Delete the user and user group assignments from the role configuration: Manage user and user group assignments for a role.
  2. Go to the effective permissions page for your users and review the resulting impact on the effective permissions: View effective permissions for a user.

To delete a role:

  1. From the Main menu, go to Administration > Permissions > Roles.
  2. Select the role and click Delete Delete.