User groups allow to group users both for organizational purposes and for assigning permissions to data. Permissions to monitoring data of host groups are assigned to user groups, not individual users.
It may often make sense to separate what information is available for one group of users and what - for another. This can be accomplished by grouping users and then assigning varied permissions to host groups.
A user can belong to any number of groups.
To configure a user group:
The User group tab contains general group attributes:
|Group name||Unique group name.|
|Users||The In group block contains a listing of the members of this group.
To add users to the group select them in the Other groups block and click on «.
|Frontend access||How the users of the group are authenticated.
System default - use default authentication
Internal - use Zabbix authentication. Ignored if HTTP authentication is set
Disabled - access to Zabbix GUI is forbidden
|Enabled||Status of user group and group members.
Checked - user group and users are enabled
Unchecked - user group and users are disabled
|Debug mode||Mark this checkbox to activate debug mode for the users.|
The Permissions tab allows you to specify user group access to host group (and thereby host) data:
|Composing permissions||Click on Add beneath the respective list to specify the host groups that the user group will have access to on the level of:
Read-write - read-write access to a host group
Read – read-only access to a host group
Deny – access to a host group denied
|Calculated permissions||Depending on the permissions set above, Calculated permissions will display all host groups and all hosts that the user group has access to on the level of:
Read-write - host groups with read-write access
Read - host groups with read-only access
Deny - host groups with access denied
A user may belong to any number of user groups. These groups may have different access permissions to hosts.
Therefore, it is important to know what hosts an unprivileged user will be able to access as a result. For example, let us consider how access to host X (in Hostgroup 1) will be affected in various situations for a user who is in user groups A and B.