User Roles
There are several different user roles in Black Duck Binary Analysis. A user can be assigned one or more roles with the exception of Power user and Read-only user, these roles cannot be combined with other roles.
Your user role is displayed in My Profile. If you have permissions to see the Manage users view, your role is displayed in Manage users > Users. If you have more than one user role, hover over the Permissions column to see the roles.
Black Duck Binary Analysis supports the following roles:
- Power user
-
A Power user possesses all the permissions available in Black Duck Binary Analysis. Everything that can be done by another user can be done by a Power user.
- Administrator
-
This role is designed for a systems admin who does not need to perform analysis-related tasks. An Administrator can configure groups, users, and accounts but cannot perform many of the tasks that other users perform, such as uploading apps and triaging vulnerabilities.
- Read-only user
-
The most limited role. A Read-only user can view applications, print reports, and export reports.
- Security reviewer
-
A security reviewer can view and compare apps, triage vendor vulnerabilites as well as export and print reports.
- Security manager
-
Has the same permissions as security reviewer, but can also triage info-leaks.
- Vendor component manager
-
Allows the user to create, edit, and delete vendor components.
- Vendor vulnerability manager
-
Allows the user to create, edit, and delete vendor vulnerabilities.
- Custom pattern search manager
-
Allows the user to create, edit, and delete custom pattern searches.
- BoM reviewer
-
A BoM reviewer can view, compare, and rescan apps.
- License reviewer
-
A role designed to give the user the ability to override component licenses.
- Basic scan user
-
A basic scan user can perform any function with regard to analyzing apps, but cannot perform functions that change the accounts of other users or that modify groups.
- Global project viewer
-
A global project viewer has the permissions to view and compare applications as well as exporting and printing reports but cannot scan new apps or make any changes.
Note, Group Manager is not a user role; it is a user (of any role) who is assigned as a manager to one or more groups. Read more about groups in the Groups section.
Capability | Power user | Administrator | Read-only user | Security reviewer | Security manager | Vendor component manager |
---|---|---|---|---|---|---|
System settings | Yes | Yes | No | No | No | No |
Manage account | Yes | Yes | No | No | No | No |
Add group | Yes | Yes | No | No | No | No |
Manage all groups in the organization | Yes | Yes | No | No | No | No |
Create users | Yes | Yes | No | No | No | No |
Upload and scan binaries | Yes | No | No | No | No | No |
View apps | Yes | Yes | Yes | Yes | Yes | No |
Move apps | Yes | Yes | No | No | No | No |
Compare apps | Yes | No | No | Yes | Yes | No |
Rescan apps | Yes | No | No | No | No | No |
Remove apps | Yes | Yes | No | No | No | No |
Override component versions | Yes | No | No | No | No | No |
Override component licenses | Yes | No | No | No | No | No |
Triage vulnerabilities | Yes | No | No | Yes | Yes | No |
Info-leaks triage | Yes | No | No | No | Yes | No |
Create/edit/delete vendor components | Yes | No | No | No | No | Yes |
Create/edit/delete vendor vulnerabilities | Yes | No | No | No | No | No |
Create/edit/delete custom pattern searches | Yes | No | No | No | No | No |
Create/edit/delete component name overrides | Yes | No | No | No | No | No |
Export and print reports | Yes | Yes | Yes | Yes | Yes | No |
Capability | Vendor vulnerability manager | Custom pattern search manager | BoM reviewer | License reviewer | Basic scan user | Global project viewer |
---|---|---|---|---|---|---|
System settings | No | No | No | No | No | No |
Manage account | No | No | No | No | No | No |
Add group | No | No | No | No | No | No |
Manage all groups in the organization | No | No | No | No | No | No |
Create users | No | No | No | No | No | No |
Upload and scan binaries | No | No | No | No | Yes | No |
View apps | No | No | Yes | Yes | Yes | Yes |
Move apps | No | No | No | No | Yes | No |
Compare apps | No | No | Yes | Yes | Yes | Yes |
Rescan apps | No | No | Yes | Yes | Yes | No |
Remove apps | No | No | No | No | Yes | No |
Override component versions | No | No | Yes | No | No | No |
Override component licenses | No | No | No | Yes | No | No |
Triage vulnerabilities | No | No | No | No | No | No |
Info-leaks triage | No | No | No | No | No | No |
Create/edit/delete vendor components | No | No | No | No | No | No |
Create/edit/delete vendor vulnerabilities | Yes | No | No | No | No | No |
Create custom pattern searches | No | Yes | No | No | No | No |
Create/edit/delete component name overrides | No | No | Yes | No | No | No |
Export and print reports | No | No | Yes | Yes | Yes | Yes |