<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenText Analytics Database 26.2.x – Users, roles, and privileges in MC</title>
    <link>/en/mc/users-roles-and-privileges/</link>
    <description>Recent content in Users, roles, and privileges in MC on OpenText Analytics Database 26.2.x</description>
    <generator>Hugo -- gohugo.io</generator>
    
	  <atom:link href="/en/mc/users-roles-and-privileges/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Mc: Configuration roles in MC</title>
      <link>/en/mc/users-roles-and-privileges/config-privileges/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/users-roles-and-privileges/config-privileges/</guid>
      <description>
        
        
        &lt;p&gt;A configuration role is a predefined role with a set of privileges that determine what users can configure on the Management Console. You grant configuration privileges on &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User Management&lt;/strong&gt; when you &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/user-admin-mc/&#34;&gt;add or edit&lt;/a&gt; a user account.&lt;/p&gt;
&lt;p&gt;The following table provides a brief overview of each role:&lt;/p&gt;

&lt;table class=&#34;table table-bordered&#34; &gt;



&lt;tr&gt; 

&lt;th &gt;
Role&lt;/th&gt; 

&lt;th &gt;
Description&lt;/th&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
SUPER&lt;/td&gt; 

&lt;td &gt;
A Linux user account, the MC SUPER administrator is the default superuser that gets created when you &lt;a href=&#34;../../../en/mc/configuring-mc/&#34;&gt;configure the MC&lt;/a&gt;.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Admin&lt;/td&gt; 

&lt;td &gt;
Full access to all MC functionality and databases managed by MC.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Manager&lt;/td&gt; 

&lt;td &gt;
Access to MC user settings, monitors all databases managed by MC, and non-database MC alerts.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
IT&lt;/td&gt; 

&lt;td &gt;
Limited access to MC user settings, monitors all databases managed by MC, MC logs, and non-database MC alerts.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
None&lt;/td&gt; 

&lt;td &gt;
No configuration privileges. This user can access one or more databases managed by MC.&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;

&lt;h2 id=&#34;super&#34;&gt;Super&lt;/h2&gt;
&lt;p&gt;The MC SUPER administrator is a Linux user account that is created when you &lt;a href=&#34;../../../en/mc/configuring-mc/&#34;&gt;configure the MC&lt;/a&gt;. This user account is unique: it cannot be altered or dropped, and you cannot grant the SUPER role to other MC users. The only property you can change for the MC SUPER administrator is the password.&lt;/p&gt;
&lt;p&gt;The MC SUPER administrator is a &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/&#34;&gt;Local user account&lt;/a&gt;, so the MC stores its login credentials and profile information internally. This account is different from the &lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-users/types-of-db-users/&#34;&gt;dbadmin account&lt;/a&gt; that is created when you install OpenText™ Analytics Database. The dbadmin account is a Linux account that owns the database catalog and storage locations, and can bypass database authorization rules, such as creating or dropping schemas, roles, and users. The MC SUPER administrator does not have the same privileges as dbadmin.&lt;/p&gt;
&lt;p&gt;The MC SUPER administrator has the following privileges:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Oversee the entire Management Console, including all database clusters managed by the MC.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

The MC SUPER administrator inherits the privileges and roles of the user name provided when importing a database into MC. It is recommended that you use the database administrator&#39;s credentials when you import a database.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Create the first MC user account.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Assign MC configuration roles.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Grant &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/&#34;&gt;database privileges&lt;/a&gt; to one or more databases managed by MC.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Configure federated server and identify provider authentication methods. For details, see &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/auth-mc/#&#34;&gt;User authentication in MC&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;On MC-managed databases, MC SUPER administrator has the same privileges as the &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/&#34;&gt;Admin database role&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;admin&#34;&gt;Admin&lt;/h2&gt;
&lt;p&gt;A user with &lt;strong&gt;Admin&lt;/strong&gt; configuration privileges can perform all administrative operations on the Management Console, including configuring and restarting the MC, and adding, editing, and deleting user accounts. An &lt;strong&gt;Admin&lt;/strong&gt; has access to all databases that the MC manages and inherits the &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/&#34;&gt;database privileges&lt;/a&gt; of the user account that sets up a database on the MC.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Admin&lt;/strong&gt; role grants a user the same configuration privileges as the MC SUPER administrator account, but you can alter and delete user accounts with &lt;strong&gt;Admin&lt;/strong&gt; privileges.&lt;/p&gt;

&lt;div class=&#34;admonition important&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Important&lt;/h4&gt;
There is also an &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/&#34;&gt;Admin database role&lt;/a&gt; that grants MC database privileges. The two Admin roles are not the same. Because the Admin configuration role inherits all database privileges from the user account that created or imported the database into the MC, you do not need to grant the Admin database role to users with the Admin configuration role.
&lt;/div&gt;
&lt;h2 id=&#34;manager&#34;&gt;Manager&lt;/h2&gt;
&lt;p&gt;Users assigned the &lt;strong&gt;Manager&lt;/strong&gt; role can add, edit, and delete users in the MC. The &lt;strong&gt;Manager&lt;/strong&gt; role grants full access to the &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User Management&lt;/strong&gt; tab. Additionally, a &lt;strong&gt;Manager&lt;/strong&gt; can view the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On the MC Home page, all databases monitored by MC.&lt;/li&gt;
&lt;li&gt;MC log.&lt;/li&gt;
&lt;li&gt;Non-database MC alerts.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The &lt;strong&gt;Manager&lt;/strong&gt; role has similar database privileges to the &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/&#34;&gt;IT database privileges role&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;it&#34;&gt;IT&lt;/h2&gt;
&lt;p&gt;Users assigned the &lt;strong&gt;IT&lt;/strong&gt; role have the following privileges:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Monitor all MC-managed databases.&lt;/li&gt;
&lt;li&gt;View non-database MC messages, logs, and alerts.&lt;/li&gt;
&lt;li&gt;Disable or enable user access to MC.&lt;/li&gt;
&lt;li&gt;Reset local user passwords.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can assign &lt;strong&gt;IT&lt;/strong&gt; users specific database privileges by mapping them to a user on a server database. The &lt;strong&gt;IT&lt;/strong&gt; user inherits the privileges assigned to the mapped server user.&lt;/p&gt;
&lt;h2 id=&#34;none&#34;&gt;None&lt;/h2&gt;
&lt;p&gt;The default role for all users on MC is &lt;strong&gt;None&lt;/strong&gt;, which does not grant any MC configuration privileges. A common strategy is to assign the &lt;strong&gt;None&lt;/strong&gt; role to grant no MC configuration privileges, and then &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/&#34;&gt;map the MC user&lt;/a&gt; to a server database user so that they can inherit database privileges from the mapped server user.&lt;/p&gt;
&lt;h2 id=&#34;role-comparison&#34;&gt;Role comparison&lt;/h2&gt;
&lt;p&gt;You grant the following configuration privileges by MC role:

&lt;table class=&#34;table table-bordered&#34; &gt;



&lt;tr&gt; 

&lt;th &gt;
Privileges&lt;/th&gt; 

&lt;th &gt;
Admin&lt;/th&gt; 

&lt;th &gt;
Manager&lt;/th&gt; 

&lt;th &gt;
IT&lt;/th&gt; 

&lt;th &gt;
None&lt;/th&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;














&lt;p&gt;Configure MC settings:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Configure storage locations and ports&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Upload new SSL certificates&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Manage LDAP authentication&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Update database installation&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Change MC theme&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Map to an external data source&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;








&lt;p&gt;Configure user settings:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Add, edit, delete users&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Add, change, delete user permissions&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Map users to one or more databases&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;






&lt;p&gt;Configure user settings:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Enable or disable user access to MC&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Reset user passwords&lt;br /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


Monitor user activity on MC using audit log&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;








&lt;p&gt;Create and manage databases and clusters:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Create a new database or import an existing one&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Create a new cluster or import an existing one&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Remove databases and clusters from MC&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


Reset MC to its original, preconfigured state&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


Restart Management Console&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


View full list of databases monitored by MC&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


View MC log&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
View non-database MC alerts&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/p&gt;
&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/users-roles-and-privileges/#&#34;&gt;Users, roles, and privileges in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/users-roles-and-privileges/user-admin-mc/#&#34;&gt;User administration in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/users-roles-and-privileges/#&#34;&gt;Users, roles, and privileges in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/#&#34;&gt;Database privileges&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/users-roles-and-privileges/user-admin-mc/#&#34;&gt;User administration in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/#&#34;&gt;Database privileges&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: Database privileges</title>
      <link>/en/mc/users-roles-and-privileges/db-privileges/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/users-roles-and-privileges/db-privileges/</guid>
      <description>
        
        
        &lt;p&gt;You can assign database privileges with a predefined database role. Each role is associated with a set of privileges that determines what a user can access on a database that the MC manages.&lt;/p&gt;
&lt;p&gt;You grant database privileges on &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User Management&lt;/strong&gt; when you &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/user-admin-mc/&#34;&gt;add or edit&lt;/a&gt; a user account. You can also map an MC user to a server database user, which allows the MC user to inherit database privileges from the server user.&lt;/p&gt;
&lt;p&gt;The following table provides a brief overview of each role:&lt;/p&gt;

&lt;table class=&#34;table table-bordered&#34; &gt;



&lt;tr&gt; 

&lt;th &gt;
Role&lt;/th&gt; 

&lt;th &gt;
Description&lt;/th&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Admin&lt;/td&gt; 

&lt;td &gt;
Full access to all databases managed by MC. Actual privileges ADMINs inherit depend on the database user account used to create or import the database into the MC interface.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Associate&lt;/td&gt; 

&lt;td &gt;
Full access to all databases managed by MC. Cannot start, stop, or drop a database. Actual privileges that Associates receive depend on those defined for the database user account to which the Associate user is mapped.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
IT&lt;/td&gt; 

&lt;td &gt;
Can start and stop a database but cannot remove it from the MC interface or drop it.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
User&lt;/td&gt; 

&lt;td &gt;
Can view database information through the database Overview and Activities pages but is restricted from viewing more detailed data.&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;

&lt;h2 id=&#34;admin&#34;&gt;Admin&lt;/h2&gt;
&lt;p&gt;Admin is the most permissive role. It is a &lt;a class=&#34;glosslink&#34; href=&#34;../../../en/glossary/db-superuser/&#34; title=&#34;&#34;&gt;superuser&lt;/a&gt; with full privileges to monitor activity and messages on databases that the MC manages. Other database privileges (such as stop or drop the database) are inherited from its &lt;a href=&#34;#mapping-to-server-users&#34;&gt;mapped server user account&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;There is also an &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;Admin configuration role&lt;/a&gt; that grants configuration privileges for the MC. The two Admin roles are not the same. The Admin MC configuration role can manage all MC users and all databases imported into the UI, but the MC database Admin role has privileges only on the databases you map this user to.&lt;/p&gt;
&lt;h2 id=&#34;associate&#34;&gt;Associate&lt;/h2&gt;
&lt;p&gt;The Associate role has the same monitoring privileges as an &lt;a href=&#34;#admin&#34;&gt;Admin&lt;/a&gt; user—full privileges to monitor MC-managed database activity and messages. Unlike the Admin user, the Associate cannot start, stop, or drop a database. The Associate user inherits database privileges its &lt;a href=&#34;#mapping-to-server-users&#34;&gt;mapped server user account&lt;/a&gt;, including the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Install or audit a license&lt;/li&gt;
&lt;li&gt;Manage database settings&lt;/li&gt;
&lt;li&gt;View Database Designer&lt;/li&gt;
&lt;li&gt;View the database Activity page&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;it&#34;&gt;IT&lt;/h2&gt;
&lt;p&gt;The IT role can view most details about a database that the MC manages, including the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Messages (and mark them read/unread)&lt;/li&gt;
&lt;li&gt;Overal database health, activity, and resources&lt;/li&gt;
&lt;li&gt;Cluster and node state&lt;/li&gt;
&lt;li&gt;MC settings&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There is also an IT role at the MC configuration access level. The two IT roles are not the same. For additional details, see &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/#&#34;&gt;Configuration roles in MC&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;user&#34;&gt;User&lt;/h2&gt;
&lt;p&gt;The User role has limited database privileges, such as viewing database cluster health, activity, resources, and messages. MC users with the User database role might have higher MC privileges, granted with &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;configuration roles&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;role-comparison&#34;&gt;Role comparison&lt;/h2&gt;
&lt;p&gt;The following table summarizes default MC database privileges by role:&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

&lt;strong&gt;Inherited&lt;/strong&gt; indicates that MC user database privileges depend on the privileges of the &lt;a href=&#34;#mapping-to-server-users&#34;&gt;mapped server user account&lt;/a&gt;.

&lt;/div&gt;

&lt;table class=&#34;table table-bordered&#34; &gt;



&lt;tr&gt; 

&lt;th &gt;
Privileges&lt;/th&gt; 

&lt;th &gt;
Admin&lt;/th&gt; 

&lt;th &gt;
Associate&lt;/th&gt; 

&lt;th &gt;
IT&lt;/th&gt; 

&lt;th &gt;
User&lt;/th&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


View database Overview page&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


View database messages&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


Delete messages and mark read/unread&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Audit and install database licenses&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;












&lt;p&gt;View database Activity page:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Queries chart&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Internal Sessions chart&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;User Sessions chart&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;System Bottlenecks chart&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;User Query Phases chart&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;


Inherited&lt;/td&gt; 

&lt;td &gt;


Inherited&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;










&lt;p&gt;View database Activity page:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Queries chart &amp;gt; Detail page&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Table Treemap chart&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Query Monitoring chart&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Resource Pools Monitoring chart&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


Start a database&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Rebalance, stop, or drop databases&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


View Manage page&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


View node details&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Replace, add, or remove nodes&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;


Start/stop a node&lt;/td&gt; 

&lt;td &gt;


Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
View database Settings page&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
Yes&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Modify database Settings page&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
View Database Designer&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
Inherited&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;

&lt;h2 id=&#34;granting-database-privileges&#34;&gt;Granting database privileges&lt;/h2&gt;
&lt;p&gt;You can grant database privileges to new and existing users on &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User Management&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Determine the &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/&#34;&gt;database privileges&lt;/a&gt; that you want to grant the new MC user.&lt;/li&gt;
&lt;li&gt;Optional: &lt;a href=&#34;../../../en/mc/db-management/creating-db-using-mc/&#34;&gt;Create&lt;/a&gt; or &lt;a href=&#34;../../../en/mc/db-management/managing-db-clusters/importing-an-existing-db-into-mc/&#34;&gt;import&lt;/a&gt; a database to associate with the new user.&lt;/li&gt;
&lt;li&gt;Optional: &lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-users/creating-db-user/&#34;&gt;Create a database user account&lt;/a&gt; if you want to map a server database user to an MC user account.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;mapping-to-server-users&#34;&gt;Mapping to server users&lt;/h3&gt;
&lt;p&gt;When you assign MC database privileges, map the MC user account to a server database user account for the following benefits:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The MC user inherits database privileges from the database user, so you need to maintain privileges for one user.&lt;/li&gt;
&lt;li&gt;Restrict the MC user from accessing functionality not permitted by the server database user account privileges.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If there is a conflict between server and MC database privileges, server privileges supersede MC privileges. When the MC user logs in, OpenText™ Analytics Database compares the MC user database privileges to the privileges assigned to its mapped server user account. The database permits the user to perform an operation in MC only when the MC user has both MC and server database privileges for that operation.&lt;/p&gt;
&lt;h3 id=&#34;grant-a-database-role&#34;&gt;Grant a database role&lt;/h3&gt;
&lt;p&gt;When you grant an MC user a database role, that user inherits the privileges assigned to its mapped server user account.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

For maximum access, use the dbadmin username and password.

&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to Management Console as an administrator, and go to &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User management&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the grid, select an MC user and select &lt;strong&gt;Edit&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Verify that &lt;strong&gt;MC configuration permissions&lt;/strong&gt; lists the correct &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;configuration role&lt;/a&gt;. &lt;strong&gt;None&lt;/strong&gt; is the default setting.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In &lt;strong&gt;DB access levels&lt;/strong&gt;, select &lt;strong&gt;Add&lt;/strong&gt; and provide the following information:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Choose a database.&lt;/strong&gt; Select a database from the list databases that you imported or created with the MC.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Database username.&lt;/strong&gt; Enter an existing database username or select the ellipsis [&lt;code&gt;...&lt;/code&gt;] button to browse running databases for a list of database users.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Database password.&lt;/strong&gt; Enter the password to the server database user account.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Restricted access.&lt;/strong&gt; Choose a database level. For details, see &lt;a href=&#34;#admin&#34;&gt;Admin&lt;/a&gt;, &lt;a href=&#34;#it&#34;&gt;IT&lt;/a&gt;, or &lt;a href=&#34;#user&#34;&gt;User&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;OK&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If the database requires TLS, select &lt;strong&gt;Yes&lt;/strong&gt; in the &lt;strong&gt;Use TLS Connection&lt;/strong&gt;, then select &lt;strong&gt;Configure TLS for user&lt;/strong&gt;. MC launches the Certificates wizard to let you configure TLS. For details, see &lt;a href=&#34;../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/mc-certificates-wizard/#&#34;&gt;MC certificates wizard&lt;/a&gt;.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

If TLS/SSL is configured in mutual mode on the database, each MC user must be configured with an individual client certificate and private key, to log into the database from MC. See &lt;a href=&#34;../../../en/mc/configuring-mc/connecting-securely-from-mc-to-db/configuring-mutual-tls-mc-users/#&#34;&gt;Configuring mutual TLS for MC users&lt;/a&gt;. If the individual certificate has not been configured, you see an error message. contact your Management Console administrator.

&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Save&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: User authentication in MC</title>
      <link>/en/mc/users-roles-and-privileges/auth-mc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/users-roles-and-privileges/auth-mc/</guid>
      <description>
        
        
        &lt;p&gt;The MC provides authentication options that integrate the MC with your existing corporate authentication workflows. By default, the MC provides &lt;a href=&#34;#local-authentication&#34;&gt;local authentication&lt;/a&gt;, which stores all user information in the MC. The MC integrates with &lt;a href=&#34;https://www.keycloak.org/&#34;&gt;Keycloak&lt;/a&gt; so you can configure &lt;a href=&#34;#federated-server-authentication&#34;&gt;federated&lt;/a&gt; or &lt;a href=&#34;#identity-provider-idp-authentication&#34;&gt;identity provider&lt;/a&gt; (IDP) authentication with the &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC SUPER administrator&lt;/a&gt; account.&lt;/p&gt;
&lt;h2 id=&#34;local-authentication&#34;&gt;Local authentication&lt;/h2&gt;
&lt;p&gt;Local user authentication is the default authentication method and does not require additional steps after you install and configure the MC. Local user information is stored on an internal database on the MC web server.&lt;/p&gt;
&lt;p&gt;You can edit or reset local user passwords in the following locations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;../../../en/mc/configuring-mc/mc-settings/&#34;&gt;Email Gateway&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Change Password&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;In the user account menu in the toolbar, select &lt;strong&gt;Change Password&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;federated-server-authentication&#34;&gt;Federated server authentication&lt;/h2&gt;
&lt;p&gt;Federated servers store your organization&#39;s user credentials in a single location so you can authenticate user identities across one or more applications. The MC integrates with Keycloak to support LDAP and LDAPS federated server configurations.&lt;/p&gt;
&lt;p&gt;The MC can access only usernames in federated servers for authentication purposes—it cannot modify any other federated user information. To edit or reset a user password, contact your organization&#39;s federated server administrator.&lt;/p&gt;
&lt;p&gt;For additional details about how LDAP and LDAPS federated services work with OpenText™ Analytics Database and MC, see &lt;a href=&#34;../../../en/security-and-authentication/client-authentication/ldap-authentication/#&#34;&gt;LDAP authentication&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;add-ssltls-certificate&#34;&gt;Add SSL/TLS certificate&lt;/h3&gt;
&lt;p&gt;If you authenticate users with LDAPS or StartTLS, you must upload a certificate to the MC to encrypt communications between the MC and the server. If you do not upload a valid certificate, the MC cannot verify the connection:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Log in to the Management Console, then go to &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;SSL/TLS Certificates&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;In the &lt;strong&gt;Manage Authentication Certificates&lt;/strong&gt; section, select &lt;strong&gt;Add New Certificate&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Browse your filesystem and upload your certificate.&lt;/li&gt;
&lt;li&gt;Restart the MC.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;After the MC restarts, the new certificate takes effect.&lt;/p&gt;
&lt;h3 id=&#34;set-up-a-federated-server&#34;&gt;Set up a federated server&lt;/h3&gt;
&lt;p&gt;This section provides guidance about how to connect the MC to a federated server for MC user authentication. Only the &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC SUPER administrator&lt;/a&gt; can configure an MC and federated server integration.&lt;/p&gt;
&lt;p&gt;The steps to configure a federated server for MC user authentication vary by organization. Refer to the following sources for comprehensive documentation about integrating federated servers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://ldap.com/&#34;&gt;LDAP documentation&lt;/a&gt; for protocol details.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.keycloak.org/docs/latest/server_admin/#keycloak-features-and-concepts&#34;&gt;Keycloak documentation&lt;/a&gt; for details about configuring Keycloak.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

The steps in this section serve as a guide only—your organization might require different settings and values. The MC provides tooltips for each field, and you can refer to the &lt;a href=&#34;https://www.keycloak.org/docs/latest/server_admin/#_user-storage-federation&#34;&gt;Keycloak documentation&lt;/a&gt; for details about specific values.

&lt;/div&gt;
&lt;p&gt;The following steps connect the MC and an &lt;a href=&#34;https://www.openldap.org/&#34;&gt;OpenLDAP&lt;/a&gt; federated server:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to the Management Console, then go to &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User Federation&lt;/strong&gt;.
You are prompted to &lt;a href=&#34;#add-ssltls-certificate-ldaps&#34;&gt;add an SSL/TLS certificate&lt;/a&gt;. OpenLDAP does not requie a certificate, so ignore the prompt and continue.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;User Federation&lt;/strong&gt; screen opens in a new tab.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;On the &lt;strong&gt;User Federation&lt;/strong&gt; screen, select &lt;strong&gt;ldap&lt;/strong&gt; from the &lt;strong&gt;Add provider...&lt;/strong&gt; dropdown list.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Add user federation provider&lt;/strong&gt; screen displays.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In &lt;strong&gt;Required Settings&lt;/strong&gt;, enter or select information for the following fields:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Console Display Name&lt;/strong&gt;: Enter a name for the federated server. This value is listed in the grid on the &lt;strong&gt;User Federation&lt;/strong&gt; screen.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Priority&lt;/strong&gt;: Enter &lt;code&gt;0&lt;/code&gt; to indicate the highest priority.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Edit Mode&lt;/strong&gt;: Select &lt;strong&gt;READ_ONLY&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Vendor&lt;/strong&gt;: &lt;strong&gt;Active Directory&lt;/strong&gt; is populated in this field.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Username LDAP attribute&lt;/strong&gt;: Enter &lt;code&gt;cn=inetOrgPerson&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;RDN LDAP attribute&lt;/strong&gt;: Enter &lt;code&gt;cn=inetOrgPerson&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;UUID LDAP attribute&lt;/strong&gt;: Enter &lt;code&gt;cn=inetOrgPerson&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;User Object Classes&lt;/strong&gt;: Enter &lt;code&gt;inetOrgPerson&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Connection URL&lt;/strong&gt;: For LDAP, use port 389. For example, &lt;code&gt;ldap://10.20.30.40:389&lt;/code&gt;.&lt;/p&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

Like LDAP, StartTLS uses port 389. For LDAPS, use port 636. For example, &lt;code&gt;ldaps://10.20.30.40:636&lt;/code&gt;.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Users DN&lt;/strong&gt;:  A distinguished name (DN) consists of two DC components. For example, &lt;code&gt;dc=example,dc=com&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Bind Type&lt;/strong&gt;: If the LDAP server supports anonymous binding, select &lt;strong&gt;none&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Otherwise, select &lt;strong&gt;simple&lt;/strong&gt;. This setting makes the &lt;strong&gt;Bind DN&lt;/strong&gt; field available. In &lt;strong&gt;Bind DN&lt;/strong&gt;, enter the administrator&#39;s DN and password.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Save&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The federated server is listed in the grid on the &lt;strong&gt;User Federation&lt;/strong&gt; screen. When you add a new user in MC, the new user is authenticated to each MC session with credentials stored in the federated server.&lt;/p&gt;
&lt;p&gt;For details on adding a federated user, see &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/user-admin-mc/#&#34;&gt;User administration in MC&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;identity-provider-idp-authentication&#34;&gt;Identity provider (IDP) authentication&lt;/h2&gt;
&lt;p&gt;You can authenticate users with an IDP service. The MC integrates with Keycloak to configure IDP services and supports the following identity protocols and social IDPs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SAML v2.0&lt;/li&gt;
&lt;li&gt;OpenID Connect v1.0&lt;/li&gt;
&lt;li&gt;Keycloak OpenID Connect&lt;/li&gt;
&lt;li&gt;Various social providers, including GitHub, Facebook, and Google.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The MC can access only usernames from IDP servers for authentication purposes—it cannot modify any IDP user information. To edit or reset a user password, you must log into your IDP server and edit the information.&lt;/p&gt;
&lt;p&gt;The steps to configure an IDP for MC user authentication vary depending on the IDP service. Refer to the &lt;a href=&#34;https://www.keycloak.org/docs/latest/server_admin/#_identity_broker&#34;&gt;Keycloak IDP documentation&lt;/a&gt; for comprehensive details about integrating identity providers.&lt;/p&gt;
&lt;h3 id=&#34;integrate-mc-and-azure-ad-idp&#34;&gt;Integrate MC and Azure AD IDP&lt;/h3&gt;
&lt;p&gt;The following sections explain how to configure IDP authentication with &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/auth-oidc&#34;&gt;Microsoft Azure AD OpenID Connect (OIDC)&lt;/a&gt;. This requires that you register an application in Azure, and then add that application as an IDP in the MC. For comprehensive documentation about creating an app in Azure, see the &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app&#34;&gt;Microsoft Azure documentation&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id=&#34;register-the-app&#34;&gt;Register the app&lt;/h4&gt;
&lt;p&gt;First, you must create your application in Microsoft Azure:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to the &lt;a href=&#34;https://portal.azure.com/&#34;&gt;Azure portal&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the search bar, enter &lt;code&gt;Azure Active Directory&lt;/code&gt; and open it.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;+ Add&lt;/strong&gt; menu at the top, select &lt;strong&gt;App registration&lt;/strong&gt; from the dropdown list.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Complete the fields on &lt;strong&gt;Register an application&lt;/strong&gt;. For details about each field, see the &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app&#34;&gt;Microsoft Azure documentation&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Register&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Your new application&#39;s &lt;strong&gt;Overview&lt;/strong&gt; page displays.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Next, create the client secret. This secret authenticates your Azure app to the MC:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In the menu on the left, select &lt;strong&gt;Certificates &amp;amp; secrets&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;On the &lt;strong&gt;Client secrets&lt;/strong&gt; tab, select &lt;strong&gt;+ New client secret&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In &lt;strong&gt;Add a client secret&lt;/strong&gt;, enter a description, and choose an expiration date.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Add&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The new secret is listed in the &lt;strong&gt;Client secrets&lt;/strong&gt; tab.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy the secret listed in the &lt;strong&gt;Value&lt;/strong&gt; column, and store it in a secure location for later use.

&lt;div class=&#34;admonition important&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Important&lt;/h4&gt;
This secret is available to copy when you generate it. If you lose this value or need to copy it during a later session, you must delete the existing secret and generate a new one.
&lt;/div&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Next, add &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/active-directory/develop/active-directory-optional-claims&#34;&gt;optional claims&lt;/a&gt; to your token configuration:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In the left-hand menu, select &lt;strong&gt;Token configuration&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;+ Add optional claim&lt;/strong&gt; to open the &lt;strong&gt;Add optional claim&lt;/strong&gt; pane to the right.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Add optional claim&lt;/strong&gt; pane, select &lt;strong&gt;ID&lt;/strong&gt; as the &lt;strong&gt;Token type&lt;/strong&gt;, and then select the following boxes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;email&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;given_name&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;family_name&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;upn&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Add&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A pop-up displays and asks you about API permissions.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the pop-up, select the checkbox and select &lt;strong&gt;Add&lt;/strong&gt;.
The claims are listed on the &lt;strong&gt;Token configuration&lt;/strong&gt; page.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Next, retrieve the client ID and application endpoint:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Overview&lt;/strong&gt; from the left-hand menu.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;Essentials&lt;/strong&gt; section, copy the &lt;strong&gt;Application (client) ID&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Save the &lt;strong&gt;Application (client) ID&lt;/strong&gt; in a secure location for later use.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;At the top of the screen, select the &lt;strong&gt;Endpoints&lt;/strong&gt; tab to display the application&#39;s available endpoints.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy the value in &lt;strong&gt;OpenID Connect metadata document&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Save this endpoint in a secure location.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 id=&#34;add-azure-ad-idp-to-the-mc&#34;&gt;Add Azure AD IDP to the MC&lt;/h4&gt;
&lt;p&gt;This section requires the following information from the &lt;a href=&#34;#register-the-app&#34;&gt;Azure AD app&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Client secret Value&lt;/li&gt;
&lt;li&gt;Application (client) ID&lt;/li&gt;
&lt;li&gt;OpenID Connect metadata document endpoint&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Only the &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC SUPER administrator&lt;/a&gt; can add Azure AD as an IDP in the MC:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to the Management Console, then go to &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Identity Providers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Identity Providers&lt;/strong&gt; screen opens in a new tab.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;OpenID Connect v1.0&lt;/strong&gt; from the &lt;strong&gt;Add provider...&lt;/strong&gt; list.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Add identity provider&lt;/strong&gt; screen displays.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the top section, add or select the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Alias&lt;/strong&gt;: (Optional) Edit this field to distinguish this IDP from others that you might integrate with the MC.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Display Name&lt;/strong&gt;: Enter &lt;code&gt;Azure AD&lt;/code&gt;. This is the name that displays on the IDP login button after you complete configuration.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Trust Email&lt;/strong&gt;: Toggle to &lt;strong&gt;On&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;First Login Flow&lt;/strong&gt;: Select &lt;strong&gt;auto_detect&lt;/strong&gt; so that the MC can detect the new user in the IDP during the first user login.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the &lt;strong&gt;OpenID Connect Config&lt;/strong&gt; section, select or add the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Client Authentication&lt;/strong&gt;: Select &lt;strong&gt;Client secret sent as post&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Client ID&lt;/strong&gt;: Add the &lt;strong&gt;Azure AD Application (client) ID&lt;/strong&gt; that you saved from the previous section.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Client Secret&lt;/strong&gt;: Add the &lt;strong&gt;Azure AD Client secret Value&lt;/strong&gt; that you saved from the previous section.&lt;/li&gt;
&lt;li&gt;In &lt;strong&gt;Default Scopes&lt;/strong&gt;, enter &lt;code&gt;openid profile email&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Go to the &lt;strong&gt;Import External IDP Config&lt;/strong&gt; section. In &lt;strong&gt;Import from URL&lt;/strong&gt;, add the &lt;strong&gt;OpenID Connect metadata document endpoint&lt;/strong&gt; that you saved from the previous section.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Import&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;MC imports the Azure application configuration and populates the URL fields.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Save&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy the value in &lt;strong&gt;Redirect URI&lt;/strong&gt; and store it in a secure location for later use. You must add this URI in Azure.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 id=&#34;complete-configuration&#34;&gt;Complete configuration&lt;/h4&gt;
&lt;p&gt;This section requires the &lt;strong&gt;Redirect URI&lt;/strong&gt; value from &lt;a href=&#34;#add-azure-ad-idp-to-the-mc&#34;&gt;Add the IDP to MC&lt;/a&gt;. Return to Azure, and complete the MC registration:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to the &lt;a href=&#34;https://portal.azure.com/&#34;&gt;Azure portal&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the search bar, enter &lt;code&gt;App registrations&lt;/code&gt; and go to your application&#39;s overview page.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Authentication&lt;/strong&gt; in the left menu.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In &lt;strong&gt;Platform configurations&lt;/strong&gt;, select &lt;strong&gt;Add a platform&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Web&lt;/strong&gt;, then add the &lt;strong&gt;Redirect URI&lt;/strong&gt; value from the MC.&lt;/p&gt;
&lt;p&gt;For details about additional Redirect URI options and your Azure AD application, see the &lt;a href=&#34;https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app#add-a-redirect-uri&#34;&gt;Microsoft Azure documentation&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Configure&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;After you complete the configuration, the MC SUPER administrator can &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/user-admin-mc/&#34;&gt;add MC user accounts&lt;/a&gt; with user identities from Azure AD. Before each user can log in to the MC, they must accept the &lt;a href=&#34;#accept-permissions-request&#34;&gt;Microsoft Azure app permissions request&lt;/a&gt;.&lt;/p&gt;
&lt;h4 id=&#34;accept-permissions-request&#34;&gt;Accept permissions request&lt;/h4&gt;
&lt;p&gt;After the MC SUPER administrator &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/user-admin-mc/&#34;&gt;adds an Azure AD IDP user&lt;/a&gt; to the MC, the user must accept the Microsoft Azure permissions request to view the MC and access its data before they can log in to the MC:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;On the MC login screen, select the &lt;strong&gt;Azure AD&lt;/strong&gt; option at the bottom of the &lt;strong&gt;Sign in to your account&lt;/strong&gt; section.

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

The &lt;strong&gt;Azure AD&lt;/strong&gt; option displays the &lt;strong&gt;Display Name&lt;/strong&gt; value that you entered in &lt;a href=&#34;#add-azure-ad-idp-to-the-mc&#34;&gt;Add Azure AD IDP to the MC&lt;/a&gt;.

&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;Enter your Azure credentials for your organization&#39;s Azure AD.&lt;/li&gt;
&lt;li&gt;When Microsoft requests permissions, select &lt;strong&gt;Accept&lt;/strong&gt; to grant Azure AD access to the MC.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;After you accept the permissions request, the user is authenticated to each MC session with Azure AD credentials.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Mc: User administration in MC</title>
      <link>/en/mc/users-roles-and-privileges/user-admin-mc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/mc/users-roles-and-privileges/user-admin-mc/</guid>
      <description>
        
        
        &lt;p&gt;Management Console (MC) users are separate from server database users. MC user accounts exist in the MC only, and you cannot alter MC users with SQL statements. You add, edit, and delete MC users entirely within the MC.&lt;/p&gt;
&lt;h2 id=&#34;add-a-user&#34;&gt;Add a user&lt;/h2&gt;
&lt;p&gt;After you install and configure the MC, only the &lt;a class=&#34;glosslink&#34; href=&#34;../../../en/glossary/mc-super-superuser-admin/&#34; title=&#34;Called Super on the MC interface, the MC super is the Linux user account that gets created when you configure MC.&#34;&gt;MC SUPER administrator (superuser)&lt;/a&gt; user exists. The MC SUPER administrator can create the other users and assign them &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC configuration roles&lt;/a&gt; that grant privileges to perform user actions.&lt;/p&gt;
&lt;h3 id=&#34;prerequisites&#34;&gt;Prerequisites&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Determine the &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC configuration role&lt;/a&gt; that you want to grant the new MC user.&lt;/li&gt;
&lt;li&gt;Determine the &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/&#34;&gt;database privileges&lt;/a&gt; that you want to grant the new MC user.&lt;/li&gt;
&lt;li&gt;Optional: &lt;a href=&#34;../../../en/mc/db-management/creating-db-using-mc/&#34;&gt;Create&lt;/a&gt; or &lt;a href=&#34;../../../en/mc/db-management/managing-db-clusters/importing-an-existing-db-into-mc/&#34;&gt;import&lt;/a&gt; a database to associate with the new user.&lt;/li&gt;
&lt;li&gt;Optional: &lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-users/creating-db-user/&#34;&gt;Create a database user account&lt;/a&gt; if you want to map a server database user to an MC user profile.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

&lt;p&gt;If you are mapping an existing user to a new MC user profile, the user must have &lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/sysmonitor/#&#34;&gt;SYSMONITOR&lt;/a&gt; or &lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-roles/predefined-db-roles/dbadmin/#&#34;&gt;DBADMIN&lt;/a&gt; privileges to do the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;View data in MC monitoring tables&lt;/li&gt;
&lt;li&gt;Load Kafka streaming data&lt;/li&gt;
&lt;/ul&gt;


&lt;/div&gt;
&lt;h3 id=&#34;add-a-local-user&#34;&gt;Add a local user&lt;/h3&gt;
&lt;p&gt;To add a local user, you must have the required &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC configuration privileges&lt;/a&gt;:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Log in to the Management Console, then go to &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User Management&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Add&lt;/strong&gt;. The &lt;strong&gt;Add a new user&lt;/strong&gt; screen displays.&lt;/li&gt;
&lt;li&gt;Select or enter the following information:
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Authentication&lt;/strong&gt;: How the user authenticates to the MC. Select &lt;strong&gt;Local&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;MC username&lt;/strong&gt;: The username of the new user. After you create and save a user, you cannot edit the username, but you can &lt;a href=&#34;#delete-a-user&#34;&gt;delete the user account&lt;/a&gt; and create a new user account with a new username.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;MC password&lt;/strong&gt;: The new user&#39;s password. The MC has the following default password requirements:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Cannot be the same as &lt;strong&gt;MC username&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Between 3 and 30 characters in length&lt;/li&gt;
&lt;li&gt;One number&lt;/li&gt;
&lt;li&gt;One uppercase letter&lt;/li&gt;
&lt;li&gt;One lowercase letter&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;As the user enters the new password, the MC verifies that the password meets the preceding requirements. If the password does not meet the requirements, then an error message is displayed. If you have the required &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC configuration privileges&lt;/a&gt;, you can edit password requirements in &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Configuration&lt;/strong&gt; &amp;gt; &lt;strong&gt;MC Password configuration settings&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;When a new user logs in, they are prompted to create a new password.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Email address&lt;/strong&gt;: Required. The new user&#39;s email address.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;MC configuration privileges&lt;/strong&gt;: The user&#39;s configuration role privileges. For details, see &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/#&#34;&gt;Configuration roles in MC&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;DB access levels&lt;/strong&gt;: The user&#39;s database privileges. For details, see &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/#&#34;&gt;Database privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Status&lt;/strong&gt;: Select &lt;strong&gt;Enabled&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Add user&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;After you add the user, the &lt;strong&gt;User Management&lt;/strong&gt; screen displays, and the user is listed in the grid.&lt;/p&gt;
&lt;h3 id=&#34;add-a-federated-or-idp-user&#34;&gt;Add a federated or IDP user&lt;/h3&gt;
&lt;p&gt;After you &lt;a href=&#34;#set-up-a-federated-server&#34;&gt;set up a federated server&lt;/a&gt; or &lt;a href=&#34;#identity-provider-idp-users&#34;&gt;set up an IDP&lt;/a&gt;, you can create MC user accounts with the user identities that the federated server or IDP manages. To add a user, you must have the required &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC configuration privileges&lt;/a&gt;:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to the Management Console, then select &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User Management&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Add&lt;/strong&gt;. The &lt;strong&gt;Add a new user&lt;/strong&gt; screen displays.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select or enter the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Authentication&lt;/strong&gt;: How the user authenticates to the MC. This list displays only the names of the federated servers or IDPs that you have set up to authenticate users:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;For federated users, select &lt;strong&gt;Federated&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;For IDP users, select &lt;strong&gt;IDP&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;MC username&lt;/strong&gt;: Add the username.&lt;/p&gt;
&lt;p&gt;For IDP users, the username is their email address.&lt;/p&gt;
&lt;p&gt;For federated users, enter the username stored in the federated server. As you enter the username, the MC searches the federated server for the username and displays the results in a list. Select the username from the list. You can use the wildcard character (&lt;code&gt;*&lt;/code&gt;) to filter names. For example, if you enter &lt;code&gt;mcuser*&lt;/code&gt;, the MC will list all users in the federation server whose usernames begin with &lt;code&gt;mcuser&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;MC configuration privileges&lt;/strong&gt;: The user&#39;s configuration role privileges. For details, see &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/#&#34;&gt;Configuration roles in MC&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;DB access levels&lt;/strong&gt;: The user&#39;s database privileges. For details, see &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/#&#34;&gt;Database privileges&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Status&lt;/strong&gt;: Select &lt;strong&gt;Enabled&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

You cannot edit the user&#39;s &lt;strong&gt;Email address&lt;/strong&gt; because it is managed by the federation server.

&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Add user&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;After you add the user, the &lt;strong&gt;User Management&lt;/strong&gt; screen displays, and the user is listed in the grid.&lt;/p&gt;
&lt;h2 id=&#34;edit-a-user&#34;&gt;Edit a user&lt;/h2&gt;
&lt;p&gt;Edit a user to update their MC configuration or database privileges. The only user account that you cannot edit is the MC SUPER administrator. You must have the required &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC configuration roles&lt;/a&gt; to edit a user account:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to the Management Console, then select &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User Management&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the grid, select the row that lists the user that you want to edit.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Edit&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Update the fields. You cannot edit the &lt;strong&gt;MC password&lt;/strong&gt; or &lt;strong&gt;Email address&lt;/strong&gt; for &lt;a href=&#34;#federated-users&#34;&gt;federated&lt;/a&gt; or &lt;a href=&#34;#identity-provider-idp-users&#34;&gt;IDP&lt;/a&gt; users.&lt;/p&gt;
&lt;p&gt;For &lt;a href=&#34;#local-authentication&#34;&gt;local users&lt;/a&gt;, you can edit the password from the &lt;strong&gt;Change Password&lt;/strong&gt; screen. To access this screen, log in to the Management Console, then select &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Change Password&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Save&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;delete-a-user&#34;&gt;Delete a user&lt;/h2&gt;
&lt;p&gt;Delete a user that you no longer authorize to access the MC. When you delete an MC user, you delete the user&#39;s audit activity and their MC profile, which includes configuration roles and database access privileges. If you do not want to delete a user but you do want to revoke a user&#39;s MC authorization, consider setting the user&#39;s &lt;strong&gt;Status&lt;/strong&gt; to &lt;strong&gt;Disabled&lt;/strong&gt;. For details, see &lt;a href=&#34;#edit-a-user&#34;&gt;Edit a user&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The only user account you cannot delete is the MC SUPER administrator. If you delete a &lt;a href=&#34;#federated-users&#34;&gt;federated&lt;/a&gt; or &lt;a href=&#34;#identity-provider-idp-users&#34;&gt;IDP user&lt;/a&gt;, you delete their MC profile only. The MC cannot change user identity information stored in federated servers or IDPs.&lt;/p&gt;
&lt;p&gt;You must have the required &lt;a href=&#34;../../../en/mc/users-roles-and-privileges/config-privileges/&#34;&gt;MC configuration roles&lt;/a&gt; to delete a user account:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to the Management Console, then select &lt;strong&gt;MC Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;User Management&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the grid, select the row that lists the user that you want to delete.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Delete&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Confirm&lt;/strong&gt; window is displayed and asks you if you are sure that you want to delete this user.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;OK&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The user is no longer listed in the &lt;strong&gt;User Management&lt;/strong&gt; grid.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

If you delete a user that is currently logged in, that user receives a message that explains that they were removed as a user and must contact the system administrator.

&lt;/div&gt;
&lt;h2 id=&#34;see-also&#34;&gt;See also&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/configuring-mc/#&#34;&gt;Configuring Management Console&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/users-roles-and-privileges/#&#34;&gt;Users, roles, and privileges in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/users-roles-and-privileges/user-admin-mc/#&#34;&gt;User administration in MC&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/mc/users-roles-and-privileges/db-privileges/#&#34;&gt;Database privileges&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/admin/db-users-and-privileges/db-users/creating-db-user/#&#34;&gt;Creating a database user&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
  </channel>
</rss>
