Role-based Access Control & Governance
Maintain control of resources while giving users the freedom of self-service IT
ELIMINATE COMPLICATED RESOURCE PROVISIONING
CONTROL WHO GETS IN AND WHAT THEY ACCESS
- Control the chaos. Know your systems and their users.
- Alleviate the painstaking approval process by triggering permissions based on groups, costs and services
- Keep users from overprovisioning resources
- Know the details of user and group-specific resource usage
WE GET WHERE YOU’RE COMING FROM
When it comes to resource provisioning, you might not know exactly who is using what across your organization. The approval process for servers and services is manual and aggravating. You like the idea of cloud management software, but you need it to reflect your organizational chart and human systems.
Take a load off—there’s a system that eliminates all of the complication and delegation from resource provisioning. CloudBolt makes organizational hierarchy clear, allowing you to see the order of your IT systems and who’s using them. Each server can be owned by a single group, and approvals can be triggered based on groups and services criteria. Users gain access to the resources they need without overprovisioning, and IT can stop the cat herding.
HOW CLOUDBOLT MAKES IT HAPPEN
CloudBolt allows you to import users and groups from your existing IT systems, monitor provisioning activity, and synchronize users on an ongoing basis to keep permissions legitimate. Management can be easily delegated to the right people so that a single administrator doesn’t get stuck managing multiple groups.
CloudBolt features the ability to enforce quotas on a per-user, per-environment and per-group basis while aggregating spending data for each of these areas. Its rich reporting system allows IT admins visibility into resource activity.
Integration with existing systems is a core tenet of CloudBolt and authentication is no exception. CloudBolt ships with the ability to integrate with existing LDAP and Active Directory infrastructures in addition to single sign-on with SAML2, 2FA, and more.
Business units, project, teams, and users can be provided with quotas that control the spend and resource usage. Limits can be placed on CPUs, Memory, Disk, Cost, and Server count in any combination. Administrators have full access to this information to make informed decisions on capacity planning and resource allocation based on hard data.
All the information stored within the CloudBolt database can be presented to users via the CloudBolt reporting engine. Group cost reports that track spend based on time on/off and environment usage are included with the product as well as the ability to create ad-hoc reports. The CloudBolt reporting engine can also be extended via custom report engine to unlock the full power of the CloudBolt data model.