Updated on 2022-02-21 GMT+08:00

Planning Authentication in a Region

Figure 1 shows the process of planning authentication in a region.

Figure 1 Process of planning authentication in a region
  • Plan regions.

    Plan regions based on physical networking and service requirements. You are advised to plan regions based on administrative zones and managed objects.

    • Plan the users who belong to the same administrative zone to the same region.
    • Plan the administrative zones that have the same managed objects to the same region.
    • A maximum of 20 regions can be planned.
  • Plan the authorization scope of a region administrator.

    Each region has region administrators. Plan the operation rights and managed objects of region administrators after planning regions.

  • Plan managed objects, operation sets, roles, and users in a region.

    Plan users who have same responsibilities to the same role. Analyze operation rights required for each role to fulfill their responsibilities and classify the operation rights into operation sets.