Skip to content

Asset Authorization⚓︎

1 Overview⚓︎

  • Click the Console button on the navigation bar to open the Console page.
  • Click Asset Management > Asset Authorization to open the Asset Authorization page.
  • Asset authorization rules restrict user access to assets, ensuring users can only access authorized assets through specific rules.

2 Create asset authorization⚓︎

  • Click the Create button on the asset authorization page and fill in the authorization rule information and submit.

V4_authorization_1

Detailed parameter descriptions:

Parameter Description
Name The name of the authorization rule
Users JumpServer login users, i.e., users authorized to connect to assets
User Groups JumpServer login user groups, i.e., user groups authorized to connect to assets
Assets Authorized assets, i.e., assets that users can connect to
Nodes Authorized nodes, i.e., asset groups that users can connect to
Account Accounts for logging in to authorized assets, supports:
All accounts: All accounts on the asset
Specified accounts: Manually enter account names
Virtual accounts:
  ◦ Manual accounts: Manually enter username/password during connection
  ◦ Same-name accounts: Use accounts with the same name as JumpServer login user
  ◦ Anonymous accounts: Do not prefill authentication information, only launch the application itself (suitable for Web/custom assets)
Protocols Protocols available to authorized users, supports:
All: Any protocol can be used
Specified protocols: Only specified protocols can be used
Actions Operations that users can perform on assets, including connection, upload, download, clipboard (RDP/VNC), SSH session sharing, etc.
Start Date The effective date of the authorization rule, defaults to creation time
Expiration Date The expiration date of the authorization rule

3 Authorization logic explanation⚓︎

  • Combined authorization: When both users and user groups are selected, all users are effective; when both assets and nodes are selected, all assets are effective, using an "AND" relationship
  • Empty options are invalid: When any required field (users/user groups, assets/nodes, accounts, etc.) is empty, the authorization rule does not take effect
  • Wildcards not supported: Authorization rules do not support * wildcard matching

4 Authorization examples⚓︎

4.1 Single user single asset authorization⚓︎

  • Authorize only a specific user to access a specific asset:
    • Users module: Select the user to authorize, leave user group empty
    • Assets module: Select the asset to log in to, leave node empty, select account to authorize (e.g., all accounts)
  • Example authorization rule: V4_authorization_2

4.2 User group single asset authorization⚓︎

  • Allow a user group to log in to one asset:
    • Users module: Select the user group to authorize, leave user empty
    • Assets module: Select the asset to log in to, leave node empty, select account to authorize (e.g., all accounts)
  • Example authorization rule: V4_authorization_5

4.3 Single user node authorization⚓︎

  • Allow a specific user to log in to a group of assets:
    • Users module: Select the user to authorize, leave user group empty
    • Assets module: Select the asset group to log in to, leave asset empty, select account to authorize (e.g., all accounts)
  • Example authorization rule: V4_authorization_8

4.4 User group node authorization⚓︎

  • Allow a user group to log in to a group of assets:
    • Users module: Select the user group to authorize, leave user empty
    • Assets module: Select the asset group to log in to, leave asset empty, select account to authorize (e.g., all accounts)
  • Example authorization rule: V4_authorization_10