Create a branch office structure using Static groups to share objects among multiple users. There are several higher and lower level administrators to ensure redundancy.
In this example, the following conditions exist:
The Administrator must determine the branch structure that best suits the organization. This example shows how to build the following structure:
Figure 1-1
The tree structure in Figure 1-1 depicts the arrangement of static groups for this example. Complete each section to setup the structure.
Figure 2-1
Click the image to view larger in new window
Figure 2-2
Click the image to view larger in new window
Repeat steps 1-4 for all static groups needed for your structure. This example will use the static group model shown in Figure 1-1.
Each user must be assigned at least one permission set. In this example, we must create eight unique permission sets. "_PS", for "permission set" is appended to the name of each set. Figure 3-1 below illustrates permission assignments in this example.
Figure 3-1
Click the image to view larger in new window
A. Permissions for top-level administrators
To provide administrator access for Admin1 and Admin2 we have to create a permission set, follow these steps to do so:
Figure 3-2
Click the image to view larger in new window
Figure 3-3
Click the image to view larger in new window
Figure 3-5
Click the image to view larger in new window
Figure 3-6
Click the image to view larger in new window
B. Permissions for branch level administrators
To create permission sets for branch level administrators, repeat steps from chapter A. using the following parameters:
Name | Tokyo_ps |
Description | Permission set for Tokyo branch administrators |
Static Groups | Tokyo Office |
Functionality | Click Grant All and remove Server Settings (both Read and Write) |
And another one for the other branch level administrator:
Name | Sydney_ps |
Description | Permission set for Sydney branch administrators |
Static Groups | Sydney Office |
Functionality | Click Grant All and remove Server Settings (both Read and Write) |
C. Permissions for home groups
To create permission sets for each branch level administrator's home group, repeat the steps from the chapter A. using the following parameters:
Name | Tokyo_1_home_ps |
Description | Permission set for Tokyo_Admin1 |
Static Groups | Tokyo_Admin_1 |
Functionality | Click Grant All and remove Server Settings (both Read and Write) |
Name | Tokyo_2_home_ps |
Description | Permission set for Tokyo_Admin2 |
Static Groups | Tokyo_Admin_2 |
Functionality | Click Grant All and remove Server Settings (both Read and Write) |
Name | Sydney_1_home_ps |
Description | Permission set for Sydney_Admin1 |
Static Groups | Sydney_Admin_1 |
Functionality | Click Grant All and remove Server Settings (both Read and Write) |
Name | Sydney_2_home_ps |
Description | Permission set for Sydney_Admin2 |
Static Groups | Sydney_Admin_2 |
Functionality | Click Grant All and remove Server Settings (both Read and Write) |
D. Permissions for sharing objects
To create permission sets for sharing objects, repeat the steps from the chapter A. using the following parameters:
Name | Shared_ps |
Description | Permission set for shared objects |
Static Groups | Shared objects |
Functionality |
Click Grant All and remove Server Settings (both Read and Write) |
After successfully creating all permission sets your permission sets list will look like this:
Figure 3-7
Log in as an Administrator and follow these steps to create the desired users:
Figure 4-1
Click the image to view larger in new window
Figure 4-2
Click the image to view larger in new window
Figure 4-3
Click the image to view larger in new window
Figure 4-4
Click the image to view larger in new window
Figure 4-5
Click the image to view larger in new window
Name | Admin2 |
Description | Top level administrator 2 |
Home Group | All |
Permission sets | Admin_ps |
Name | Tokyo_Admin1 |
Description | Tokyo office administrator 1 |
Home Group | Tokyo_Admin_1 |
Permission sets | Tokyo_ps, Shared_ps, Tokyo_1_home_ps |
Name | Tokyo_Admin2 |
Description | Tokyo office administrator 2 |
Home Group | Tokyo_Admin_2 |
Permission sets | Tokyo_ps, Shared_ps, Tokyo_2_home_ps |
Name | Sydney_Admin1 |
Description | Sydney office administrator 1 |
Home Group | Sydney_Admin_1 |
Permission sets | Sydney_ps, Shared_ps, Sydney_1_home_ps |
Name | Sydney_Admin2 |
Description | Sydney office administrator 2 |
Home Group | Sydney_Admin_2 |
Permission sets | Sydney_ps, Shared_ps, Sydney_2_home_ps |
You can only import licenses to users with the home group All. In this example, the Admin1 and Admin2 users have the All home group, so you can import licenses to them and they can distribute licenses to other users. Follow the steps below to import a licenses to these users and then assign licenses to other users.
Figure 5-1
Click the image to view larger in new window
Figure 5-2
Figure 5-3
Figure 5-4
Click the image to view larger in new window
Figure 5-5
Click the image to view larger in new window
Follow these steps to import and move licenses within different access groups.
When a policy is created it is automatically contained in the home group of the user who created it. You can move existing policies to other groups where your user has Write permissions (for Policies).
In this example we create a policy for Windows Endpoints and we move it to Shared group, weher all users can use it for their computers.
Figure 6-1
Click the image to view larger in new window
Figure 6-2
Click the image to view larger in new window
Figure 6-3
Click the image to view larger in new window
The policy will be moved to the shared group and all users with the appropriate permissions set (Shared_ps) will be able to use it on computers/devices.
To create a policy which will only be available only to top-level administrators, Create a policy in the group All to make it available only to top-level administrators (other users in our setup do not have access to the group All).
Create a client task that will be shared in the Tokyo office branch. It will be accessible to Tokyo administrators and top-level administrators.
Figure 7-1
Figure 7-2
Figure 7-3
Click the image to view larger in new window
This procedure is similar to the shared policy; only a few details are modified.
The policy will be saved in the home group of the current user, which means it will only be accessible to this user and top-level administrators. This branch administrator can apply this policy to all computers and devices to which they have access.
Any user with sufficient permissions over their home group, the target group and certificates can create an installer that is shared between all level admins.
Figure 8-1
Figure 8-2
Figure 8-3
Click the image to view larger in new window
Figure 8-4
Click the image to view larger in new window
Figure 8-5
Click the image to view larger in new window
Figure 8-6
The installer will be moved to the shared group and will be available for all users with permissions over this group.