<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to grant access to a user to only access data/entities/etc for a specific Management Zone or equivalent in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-grant-access-to-a-user-to-only-access-data-entities-etc/m-p/271878#M35924</link>
    <description>&lt;P&gt;For further read I also post similar solution &lt;A href="https://community.dynatrace.com/t5/Open-Q-A/Restrict-metric-access-via-IAM-policy/m-p/268488#M35520" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Fri, 07 Mar 2025 14:48:23 GMT</pubDate>
    <dc:creator>DanielS</dc:creator>
    <dc:date>2025-03-07T14:48:23Z</dc:date>
    <item>
      <title>How to grant access to a user to only access data/entities/etc for a specific Management Zone or equivalent</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-grant-access-to-a-user-to-only-access-data-entities-etc/m-p/271850#M35922</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've been trying to do this but I could not find a solution.&lt;/P&gt;&lt;P&gt;user "A" belongs to Group "G"&lt;/P&gt;&lt;P&gt;Objetive:&amp;nbsp;&lt;/P&gt;&lt;P&gt;-user A access to environment&lt;/P&gt;&lt;P&gt;- user A: read access to host/process/services data for only the entities in MZ "M".&lt;/P&gt;&lt;P&gt;What permissions or custom policy should I specify to accomplish this? Please provide details here.&lt;/P&gt;&lt;P&gt;Any help is appreciated.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Antonio&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 12:55:32 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-grant-access-to-a-user-to-only-access-data-entities-etc/m-p/271850#M35922</guid>
      <dc:creator>ajvillarroelp1</dc:creator>
      <dc:date>2025-03-07T12:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to grant access to a user to only access data/entities/etc for a specific Management Zone or equivalent</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-grant-access-to-a-user-to-only-access-data-entities-etc/m-p/271871#M35923</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/81400"&gt;@ajvillarroelp1&lt;/a&gt; I can share with you the main points to be able to do it:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The concept of MZ has been deprecated in the new environment so you need to use the dt.security_context field. With this in mind Dynatrace provide us with the option to set for any entity the dt.security_context&amp;nbsp; easily.&lt;/LI&gt;&lt;LI&gt;Go to&amp;nbsp;Settings - Topology model - Grail security context for monitored entities and bind your entities to the Management Zones.&lt;/LI&gt;&lt;LI&gt;This example applies for entities&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;//Grail read data
ALLOW storage:entities:read;
ALLOW storage:buckets:read WHERE storage:table-name IN ("entities");}​&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Then create a Boundary to apply to this policy, with your MZ data&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;storage:dt.security_context = "&amp;lt;Your MZ Name&amp;gt;";​&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Then you need to replicate this for data, metrics with different policies.&lt;/LI&gt;&lt;LI&gt;To Give user A access you can use this standard policy (feel free to modify as needed):&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;//States
ALLOW state:app-states:delete, state:app-states:read, state:app-states:write, state:user-app-states:read, state:user-app-states:write, state:user-app-states:delete, state-management:user-app-states:delete, state-management:user-app-states:delete-all;

//Documents
ALLOW document:documents:read, document:documents:write, document:documents:delete, document:environment-shares:read, document:environment-shares:write, document:environment-shares:claim, document:environment-shares:delete, document:direct-shares:read, document:direct-shares:write, document:direct-shares:delete, document:trash.documents:read, document:trash.documents:restore, document:trash.documents:delete;

//Unified analysis screens
ALLOW unified-analysis:screen-definition:read;

//Grail
ALLOW storage:bucket-definitions:read;
ALLOW storage:fieldset-definitions:read;
ALLOW storage:filter-segments:read, storage:filter-segments:write, storage:filter-segments:delete;

//OpenPipeline
ALLOW openpipeline:configurations:read;

//Hub
ALLOW hub:catalog:read;

//AppEngine
ALLOW app-engine:apps:run, app-engine:functions:run, app-engine:edge-connects:read;

//Notifications
ALLOW email:emails:send, notification:self-notifications:read, notification:self-notifications:write;

//AutomationEngine
ALLOW automation:workflows:read, automation:calendars:read, automation:rules:read;
ALLOW automation:workflows:write WHERE automation:workflow-type = "SIMPLE";
ALLOW automation:workflows:run;

//Davis
ALLOW davis:analyzers:read, davis-copilot:conversations:execute, davis-copilot:nl2dql:execute, davis:analyzers:execute;

//Settings
ALLOW settings:objects:read, settings:schemas:read, app-settings:objects:read;

//Classics
ALLOW environment:roles:viewer, environment:roles:view-security-problems;

//Geolocations
ALLOW geolocation:locations:lookup;

// Vulnerability service
ALLOW vulnerability-service:vulnerabilities:read;

//SLOs
ALLOW slo:slos:read, slo:objective-templates:read;

//BusinessInsights
ALLOW insights:opportunities:read;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 14:24:33 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-grant-access-to-a-user-to-only-access-data-entities-etc/m-p/271871#M35923</guid>
      <dc:creator>DanielS</dc:creator>
      <dc:date>2025-03-07T14:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to grant access to a user to only access data/entities/etc for a specific Management Zone or equivalent</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-grant-access-to-a-user-to-only-access-data-entities-etc/m-p/271878#M35924</link>
      <description>&lt;P&gt;For further read I also post similar solution &lt;A href="https://community.dynatrace.com/t5/Open-Q-A/Restrict-metric-access-via-IAM-policy/m-p/268488#M35520" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 14:48:23 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-grant-access-to-a-user-to-only-access-data-entities-etc/m-p/271878#M35924</guid>
      <dc:creator>DanielS</dc:creator>
      <dc:date>2025-03-07T14:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to grant access to a user to only access data/entities/etc for a specific Management Zone or equivalent</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/How-to-grant-access-to-a-user-to-only-access-data-entities-etc/m-p/272413#M35982</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thank you for the answer. At the end, the solution that worked for me&amp;nbsp; was this:&lt;/P&gt;&lt;P&gt;1.- Create a boundary&lt;/P&gt;&lt;P&gt;environment:management-zone = "MZNAME";&lt;BR /&gt;storage:dt.security_context = "MZNAME";&lt;/P&gt;&lt;P&gt;2.- Add the following custom policy (let's call it ACCESSREAD):&lt;/P&gt;&lt;P&gt;ALLOW environment:roles:viewer;&lt;BR /&gt;ALLOW storage:entities:read;&lt;/P&gt;&lt;P&gt;3.- Assign the ACCESSREAD policy to the group&amp;nbsp; indicating the boundary created in the first step&lt;/P&gt;&lt;P&gt;4.- Assign the following permissions to the group indicating the boundary created in the first step&lt;/P&gt;&lt;P&gt;Read Entities,&amp;nbsp;Standard User,&amp;nbsp;Read Events,&amp;nbsp;Read Security Events,&amp;nbsp;All Grail data read access&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for the help.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Antonio&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 15:25:18 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/How-to-grant-access-to-a-user-to-only-access-data-entities-etc/m-p/272413#M35982</guid>
      <dc:creator>ajvillarroelp1</dc:creator>
      <dc:date>2025-03-13T15:25:18Z</dc:date>
    </item>
  </channel>
</rss>

