用户和安全管理

It’s possible to access security and user management screens via the top menu.This option is only visible to users assigned to an‘Administrator’ role.

屏幕截图2020-07-21在2.04.11 pm.png

用户管理和角色

‘Administrator’ users are able to manage and create new users in the system. Roles是预先定义的,目前无法定制。每个用户都可以具有一个角色。

Roles

The following roles are available in the platform:

Role Name

允许的权限 /操作

View Only
  • Login
  • View Markets
  • 查看需求中心细分市场

内容管理

  • Login
  • View Markets
  • 查看需求中心细分市场
  • View Sales Coach Content
  • 修改销售教练内容 /设置

Demand Generation

  • Login

  • View Markets

  • 查看需求中心细分市场

  • Increment List

  • Upload List

  • Export List

  • 创建NN帐户列表和细分

  • 创建NN线索列表和细分

  • 创建需求中心NN和分段列表s

Demand & Content

  • Login
  • View Markets

  • 查看需求中心细分市场

  • Increment List

  • Upload List

  • Export List

  • 创建NN帐户列表和细分

  • 创建NN线索列表和细分

  • 创建需求中心NN和分段列表s

  • View Sales Coach Content

  • 修改销售教练内容 /设置

市场建设者

  • Login
  • View Markets
  • 查看需求中心细分市场
  • 创建市场
  • Increment List
  • Upload List
  • Export List
  • 创建NN帐户列表和细分
  • 创建NN线索列表和细分
  • 创建需求中心NN和分段列表s
  • Change Market Definitions (i.e. A/B/C/D ranks,pipeline or exportable MIs)
  • View Sales Coach Content

Marketing Ops

  • Login
  • View Markets
  • 查看需求中心细分市场
  • 创建市场
  • Increment List
  • Upload List
  • Export List
  • 创建NN帐户列表和细分
  • 创建NN线索列表和细分
  • 创建需求中心NN和分段列表
  • Change Market Definitions (i.e. A/B/C/D ranks,pipeline or exportable MIs)
  • 更改集成设置(Eloqua,Marketo,SFDC,Integrate,ML)
  • Change NN Leads Settings (ZoomInfo settings)
  • Change Demand Center settings
  • Change General settings
  • Suppression File Management
  • View Sales Coach Content
  • 修改销售教练内容 /设置
  • 查看所有任务

Administrators

  • 包括用户管理在内的客户“组织”的完全访问

用户管理

The platform allows ‘Administrator’ user to add new users and manage existingusers. All users in the system are visible in the single list. It is possible to filter the list by role or use a search box to search names or emails.

Screen Shot 2020-07-30 at 1.25.09 PM.png

When a user is created, a name and an email address must be provided (email is also used as User Name). A user should be assigned to a Role.
创建后,用户将收到一封注册电子邮件,该电子邮件将允许他或她设置密码。该电子邮件还包括重要的登录信息。

用户创建时总是“激活”。

Screen Shot 2020-07-30 at 1.26.44 PM.png

编辑用户时,可以更改其名称和角色。无法更改用户的电子邮件地址。
其他选项包括:

  • Forcing a user to change the password on next login while maintaining his current credentials active.

  • 重置密码选项将使当前用户凭据无效,并且send him an email to ‘reset password’.

Screen Shot 2020-07-30 at 1.28.51 PM.png

组织安全设置

Password Security Settings

此功能使您可以设置组织范围内的安全设置,例如最小密码长度和安全密码所需的不同字符类。

Furthermore, it is possible to enforce a periodic password change. Setting this parameter to 0 would disable password change enforcement.

也可以控制“密码历史记录”跟踪的执行和数字记住的密码。目前,默认情况下,记住了3个最后密码by the system. Setting this parameter to 0 would disable ‘Password History’追踪。

Screen Shot 2020-07-30 at 1.35.02 PM.png

Single Sign-On Settings

You can also configure optional SSO integration with OKTA (Okta Simplified) or SAML. If you configure SSO integration you will not need to manually create users in Mintigo and you can rely on your SSO provider for management of passwords and user lifecycle.

OKTA Simplified SSO

To use OKTA Simplified SSO, you first need to perform configuration changes in OKTA and then in Mintigo platform. Please follow the steps below.

How to set up the integration on OKTA side:

  1. 在管理控制台下,转到申请。

  2. Click “Add Application”-> “Create New App”.

  3. 平台: Single Page App (SPA), Sign on method: OpenID Connect.

  4. 应用程序名称:“ Mintigo OP”,登录重定向URI:

    https://app.mintigo.com/api/sso-login/。请注意落后的斜线(/)

    character as it is important. Click “Save”.

  5. In app screen that opened, click “Edit”.

  6. “Login initiated by” – select “Either OKTA or App”.

  7. Check “Display application icon to users”.

  8. Login flow- 选择“直接将ID令牌发送到App(Signlified Okta)。

  9. 范围选择电子邮件,组,个人资料。

  10. 注意客户ID,您将需要在预测性的“配置”屏幕中见解platform, as described below.

  11. Click “Assignments” tab. Make sure that the app is assigned to the relevantemployees in your organization.

  12. Continue configuration in Mintigo Platform.

Configuration in Mintigo:

该平台将使您自动注册通过OKTA登录的用户,他们将在此屏幕中获得默认用户角色。

To configure OKTA Simplified SSO, go to Single Sign-On tab, enable Single Sign-On choose OKTA from provider drop-down. Then define the following settings:

屏幕截图2020-07-30,9.40.43 pm.png

Issuer URL is your OKTA URL, for example, yourbiz.okta.com. Client ID is the OKTA application (chiklet)您生成的客户ID多于。如果您没有方便,它将显示在OKTA的应用程序设置中,在客户凭证部分下。

Default Role for Auto-Provisioned users is the default role that users that were logged in via OKTA will receive if they were not provisioned before.

Note:please note that chiklet for OKTA has to be manually created by user with relevant permissions in OKTA.

Please save to apply the configuration.

SAML Based SSO

The platform will let you auto-register users that login via SAML IdP and they will receive default user role as configured in this screen.

To configure SAML based SSO, go to Single Sign-On tab, enable Single Sign-On choose SAML from provider drop-down. Then, you will be presented with a list of settings relevant for this type of integration.

屏幕截图2020-07-30在9.44.52 PM.PNG

  • ‘Mintigo Entity ID’ should be copied into ‘Entity ID’ field in your SAML ldPconfiguration page.

  • “ mintigo acs” URL应在您的SAML LDP中复制到“ ACS URL”中configuration page.

  • “ SSO Direct Link”字段应复制到您的SAML LDP中的“开始URL”字段中configuration page.

The following parameters need to be provided:

  • ‘Entity ID’ URL from your SAML configuration page should be copied into ‘ldP

    “实体ID”字段在“设置”页面中。

  • 请上传证书和IDP元数据XML

  • Default Role for Auto-Provisioned users is the default role that users that

    如果以前没有配备,则通过SAML登录将收到。

Important:在IDP上定义SSO应用程序时,必须确保通过以下索赔:

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/user_mail

http://schemas.xmlsoap.org/ws/2005/05/istentity/claims/givenname

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

USER_EMAIL是强制性的,因为这是我们识别系统中用户的方式,只要通过,其余的索赔就可以是您想要的任何字段。

0Kudos
Labels(1)