Clear role-based controls and a two-person policy approval requirement reduce the risk of misconfiguration and ensure access is scoped to organization-specific data, supporting operational security and governance for Protective DNS deployments.
The video walks through user management in the Protective DNS management application, showing how managers add organizational users, assign roles, and control access. By default new users receive read-only access to dashboards, policies, threat analysis and organization info; additional roles (user management, DNS policy management, reporting, configuration manager, API management) grant specific administrative capabilities. It explains required fields for new users (.gov email verification, name) and optional fields, the two-policy-manager requirement for policy changes, and the lifecycle statuses (registered, active, inactive, suspended). Managers are instructed to have users log out and back in for role changes to take effect and are shown confirmation banners and welcome-email behavior after user creation.
Comments
Want to join the conversation?
Loading comments...