Fortinet white logo
Fortinet white logo

Administration Guide

Admin Profiles

Admin Profiles

Use administrator profiles to control administrator access privileges to system features. When you create an administrator account, you assign a profile to the account.

You cannot modify or delete the following predefined administrator profiles:

  • Read Write has access to all functionality. This includes creating, editing, and deleting administrator profiles
  • Read only has read-only access.

The Menu Access section has the following settings:

None

User cannot view or make changes to that page.

Read Only

User can view but not make any change to that page, except session-related user settings such as Table Customization, Dashboard, or Attack Map filter.

Read Write

User can view and make changes to that page.

Super Admin

User cannot view or make changes to that page.

Regular Admin

User cannot view or make changes to that page.

The CLI Commands section has the following settings:

None

User cannot execute CLI commands.

Execute

User can execute CLI commands.

To create an Administrator Profile:
  1. Go to System > Admin Profiles.
  2. Select the Profile Name.
  3. Click Create New.
  4. Specify the Profile Name.
  5. If you wish, add a Comment.
  6. Specify the privileges for Menu Access:

    DashboardDashboard
    Central ManagementAppliances
    Deception
    • Custom Decoy Image

    • Deception OS
    • Deployment Network
    • Deployment Wizard
    • Decoy Status

    • Deployment Map
    • Asset Discovery

    • Safe List
    • Lure Resources

    • Deception Token

    Incident
    • Analysis
    • Campaign
    • Attack Map
    Fabric
    • Integration Devices
    • Quarantine Status
    • IOC Export
    • Detection Devices

    Network
    • Interfaces
    • System DNS
    • System Routing
    System
    • Administrators
    • Admin Profiles
    • Certificates
    • LDAP Servers
    • RADIUS Servers
    • Mail Server
    • SNMP
    • Login Disclaimer
    • FortiGuard
    • FDC License

    • System Settings
    • Table Customization
    Log
    • All Events
    • Log Servers

    REST API

    • Decoy
    • Attack
  7. Specify the privileges for CLI Commands:

    Configuration
    • Set
    • Unset
    System
    • Reboot
    • Shutdown
    • Reset Configuration
    • Factory Reset
    • Firmware Upgrade
    • Reset Widgets
    • IP Tables
    • test-network
    • usg-license
    • Set Confirm ID for Windows VM
    • List VM License
    • Show VM Status
    • VM reset
    • DC Image Status
    • Set Maintainer
    • Set Timeout for Remote Auth
    • Data Purge
    • Log Purge
    • DMZ Mode
    • FDN Package Information
    • Fabric Binding
    • Central Management Settings
    Utilities
    • TCP Dump
    • Trace Route

    Diagnostics

    • Diagnose
  8. Click Save.

Admin Profiles

Admin Profiles

Use administrator profiles to control administrator access privileges to system features. When you create an administrator account, you assign a profile to the account.

You cannot modify or delete the following predefined administrator profiles:

  • Read Write has access to all functionality. This includes creating, editing, and deleting administrator profiles
  • Read only has read-only access.

The Menu Access section has the following settings:

None

User cannot view or make changes to that page.

Read Only

User can view but not make any change to that page, except session-related user settings such as Table Customization, Dashboard, or Attack Map filter.

Read Write

User can view and make changes to that page.

Super Admin

User cannot view or make changes to that page.

Regular Admin

User cannot view or make changes to that page.

The CLI Commands section has the following settings:

None

User cannot execute CLI commands.

Execute

User can execute CLI commands.

To create an Administrator Profile:
  1. Go to System > Admin Profiles.
  2. Select the Profile Name.
  3. Click Create New.
  4. Specify the Profile Name.
  5. If you wish, add a Comment.
  6. Specify the privileges for Menu Access:

    DashboardDashboard
    Central ManagementAppliances
    Deception
    • Custom Decoy Image

    • Deception OS
    • Deployment Network
    • Deployment Wizard
    • Decoy Status

    • Deployment Map
    • Asset Discovery

    • Safe List
    • Lure Resources

    • Deception Token

    Incident
    • Analysis
    • Campaign
    • Attack Map
    Fabric
    • Integration Devices
    • Quarantine Status
    • IOC Export
    • Detection Devices

    Network
    • Interfaces
    • System DNS
    • System Routing
    System
    • Administrators
    • Admin Profiles
    • Certificates
    • LDAP Servers
    • RADIUS Servers
    • Mail Server
    • SNMP
    • Login Disclaimer
    • FortiGuard
    • FDC License

    • System Settings
    • Table Customization
    Log
    • All Events
    • Log Servers

    REST API

    • Decoy
    • Attack
  7. Specify the privileges for CLI Commands:

    Configuration
    • Set
    • Unset
    System
    • Reboot
    • Shutdown
    • Reset Configuration
    • Factory Reset
    • Firmware Upgrade
    • Reset Widgets
    • IP Tables
    • test-network
    • usg-license
    • Set Confirm ID for Windows VM
    • List VM License
    • Show VM Status
    • VM reset
    • DC Image Status
    • Set Maintainer
    • Set Timeout for Remote Auth
    • Data Purge
    • Log Purge
    • DMZ Mode
    • FDN Package Information
    • Fabric Binding
    • Central Management Settings
    Utilities
    • TCP Dump
    • Trace Route

    Diagnostics

    • Diagnose
  8. Click Save.