With automated user management (AUM), your users and groups in your identity provider (like OneLogin or Okta) are synchronized with New Relic.
How groups work with your users
When using automated user management, all group administration happens in your identity provider. If your existing groups logically map to access in New Relic, we recommend sending your existing groups. This makes providing and changing access to New Relic from your identity provider easy.
An example of how the user groups in your identity provider might map over to access grants in New Relic, which assign a group access to a specific role (default or customer) on a specific account.
In the above example, let’s focus on the Engineers group. Via SCIM, New Relic will receive the two user records as well as the information that they belong to the Engineers group. In this example, the configuration would be: the two Engineer users have the Read only role on Account 1, the Standard user role on Account 2, and the All product admin role on Account 3.
This access is given by creating three access grants in New Relic:
- Access grant assigning the role Read only to the group Engineers on Account 1
- Access grant assigning the role Standard user to the group Engineers on Account 2
- Access grant assigning the role All product admin to the group Engineers on Account 3
To learn more about how access grants work, see User management concepts.
For tutorials on creating new groups and custom roles, see User management tutorials.
その他のヘルプ
さらに支援が必要な場合は、これらのサポートと学習リソースを確認してください:
- Explorers Hubでは、コミュニティからのサポートを受けたり、ディスカッションに参加したりすることができます。
- 当社サイトで答えを見つけて、サポートポータルの使用方法を確認してください。
- Linux、Windows、およびmacOS向けトラブルシューティングツールであるNew Relic Diagnosticsを実行してください。
- New Relicの とandドキュメント をご確認ください。