Owner's manual
Table Of Contents
- Chapter 1: Introduction
- Chapter 2: Accessing CC-SG
- Chapter 3: Configuring CC-SG with Guided Setup
- Chapter 4: Creating Associations
- Chapter 5: Adding Devices and Device Groups
- Chapter 6: Configuring Nodes and Interfaces
- Chapter 7: Adding and Managing Users and User Groups
- Chapter 8: Policies
- Chapter 9: Configuring Remote Authentication
- Chapter 10: Generating Reports
- Audit Trail Report
- Error Log Report
- Access Report
- Availability Report
- Active Users Report
- Locked Out Users Report
- User Data Report
- Users in Groups Report
- Group Data Report
- AD User Group Report
- Asset Management Report
- Node Asset Report
- Active Nodes Report
- Node Creation Report
- Query Port Report
- Active Ports Report
- Scheduled Reports
- CC-NOC Synchronization Report
- Chapter 11: System Maintenance
- Chapter 12: Advanced Administration
- Appendix A: Specifications (G1, V1, and E1)
- Appendix B: CC-SG and Network Configuration
- Appendix C: User Group Privileges
- Appendix D: SNMP Traps
- Appendix E: Troubleshooting
- Appendix F: Two-Factor Authentication
- Appendix G: FAQs
- Appendix H: Keyboard Shortcuts

CHAPTER 8: POLICIES 89
Chapter 8: Policies
Controlling Access Using Policies
Configuring new policies to provide user access to nodes is optional, but central to making
effective use of CC-SG ability to control that access. If you want to give all users access to all
nodes, simply assign the Full Access Policy to all user groups.
If you want to have more control over user access to nodes you will need to create policies to
define rules for that access. Like all privileges, policies are assigned to User Groups in order to
apply those access rules to the users in the group.
If you completed Guided Setup (refer Chapter 3: Configuring CC-SG with Guided Setup), a
number of basic policies may already have been created. Now, you may want to apply these
policies to existing user groups. If you have not used Guided Setup or created the desired
policies you will want to follow the directions below. You will:
• Create Node Groups to organize the nodes you want to create access rules for.
• Create Device Groups if you want to create access rules for Raritan devices providing
interfaces to nodes.
• Create a policy for a node (or device) specifying when access to that node can occur.
• Apply this policy to a user group.
Policy Summary
The following diagram is a visual representation of how to implement security with CC-SG:
Figure 87 Policy Summary