SlideShare a Scribd company logo
1 of 9
Anypoint Access
Management - USERS
SHANKY GUPTA
Assumptions
 This presentation assumes that you have an Organization Administrator
role in your organization, or that you have API Version Owner permissions
and want to manage user permissions for your API version.
Updating Your Own User Information
 Once logged in, select Profile on the top right menu.
You can easily update your basic account
information from here:
 There you’ll be able to modify your name,
email, change your password and see
a list of the roles assigned to your account.
Managing Users
 As an Admin of your organization, or of one of its business groups, you can
enable, disable, or delete the users in it. Access this menu by first making sure
that the correct business group is selected in the top-right of the screen next to
your user name, then clicking the gear icon next to it, and then picking
the Users link in the left menu.
 By ticking the checkbox next to a user, a few more options related to that user
are displayed, specifically:
 Enable: Enables the user in the selected Organization / Business Group.
 Disable: Disables the user in the selected Organization / Business Group.
 Delete: Deletes the user in the selected Organization / Business Group.
Inviting Users
 As an Organization Administrator, or of one of its business groups, you can invite
new users and manage existing users for your organization on the Access
Management Administration page, which you can reach by selecting the Users
option in your Access Management section.
 In order to invite new users to your organization:
 Click Users in the left navigation bar.
 Click Invite user.
 Enter the email addresses of who you want to invite in your organization as a comma-separated
list.
 Optionally, select one or more roles to which to assign these users.
 Click Send Invitation.
Inviting Users …continued
 The users who you invite receive email invitations to sign up to your
organization.
 Invited users have access to the same set of resources as you (although they
may have different roles that can restrict what they can view or do). They will
receive an email inviting them, and if they click through the link they will be
presented a sign-up form that already has the Company field completed,
matching your organization.
Resend or cancel a sent invitation
 Click Pending Invites to view all invitations that have not yet been
accepted. Select the ones you need to manage, and click Re-send
Invite or Cancel Invite.
Granting Permissions and Roles to Users
 By clicking on a username you
can access more information
about that user, add roles and
permissions to it, or reset its
password.
Granting Permissions and Roles to Users
…continued
 By default in every new organization and business group when first created, you get three options:
 Assign API Permissions: write the name of the API you want to give access to, then pick a version and
permission.
 Assign Runtime Manager Permissions: write the name of the Runtime Manager environment to want to give
access to, then pick a permission
 Assign Roles: write the name of the role you want to grant. Check the roles section for a description of the
default roles within an organization and business group.
 Roles and permissions are grouped under organizations (and optionally under business groups too). This
means that you can only assign roles and permissions that are related to resources that exist in the
organization and/or business group that you are selecting.
 If necessary, you can also remove user permissions, but keep in mind that if users have been granted their
permission via a role, you cannot view or remove those role-based permissions here, you must do it via
the Roles section.fs

More Related Content

What's hot

User Management in SyncBlaze
User Management in SyncBlazeUser Management in SyncBlaze
User Management in SyncBlazeVembu - SyncBlaze
 
Building Serverless Applications with Microsoft Graph - ECS 2018
Building Serverless Applications with Microsoft Graph - ECS 2018Building Serverless Applications with Microsoft Graph - ECS 2018
Building Serverless Applications with Microsoft Graph - ECS 2018Dragan Panjkov
 
Forms authentication in asp dot net
Forms authentication in asp dot netForms authentication in asp dot net
Forms authentication in asp dot netPooja Gaikwad
 
Bulk Profile Operations in Salesforce using BOFC App
Bulk Profile Operations in Salesforce using BOFC AppBulk Profile Operations in Salesforce using BOFC App
Bulk Profile Operations in Salesforce using BOFC AppAtocloud
 
Visualforce report
Visualforce reportVisualforce report
Visualforce reportRinku Saini
 
Introduction to visualforce
Introduction to visualforceIntroduction to visualforce
Introduction to visualforceRinku Saini
 
Power Apps - Data governance, compliance and security
Power Apps  - Data governance, compliance and securityPower Apps  - Data governance, compliance and security
Power Apps - Data governance, compliance and securityLearning SharePoint
 

What's hot (8)

User Management in SyncBlaze
User Management in SyncBlazeUser Management in SyncBlaze
User Management in SyncBlaze
 
Building Serverless Applications with Microsoft Graph - ECS 2018
Building Serverless Applications with Microsoft Graph - ECS 2018Building Serverless Applications with Microsoft Graph - ECS 2018
Building Serverless Applications with Microsoft Graph - ECS 2018
 
Franchise Master
Franchise MasterFranchise Master
Franchise Master
 
Forms authentication in asp dot net
Forms authentication in asp dot netForms authentication in asp dot net
Forms authentication in asp dot net
 
Bulk Profile Operations in Salesforce using BOFC App
Bulk Profile Operations in Salesforce using BOFC AppBulk Profile Operations in Salesforce using BOFC App
Bulk Profile Operations in Salesforce using BOFC App
 
Visualforce report
Visualforce reportVisualforce report
Visualforce report
 
Introduction to visualforce
Introduction to visualforceIntroduction to visualforce
Introduction to visualforce
 
Power Apps - Data governance, compliance and security
Power Apps  - Data governance, compliance and securityPower Apps  - Data governance, compliance and security
Power Apps - Data governance, compliance and security
 

Viewers also liked

Message properties component in mule
Message properties component in muleMessage properties component in mule
Message properties component in muleKhan625
 
Mule Microsoft Service Bus
Mule Microsoft Service BusMule Microsoft Service Bus
Mule Microsoft Service BusAnkush Sharma
 
Scatter and gather in mule
Scatter and gather in muleScatter and gather in mule
Scatter and gather in muleRajkattamuri
 
MuleSoft ESB Composite Source
MuleSoft ESB Composite SourceMuleSoft ESB Composite Source
MuleSoft ESB Composite Sourceakashdprajapati
 
Controlling Message Flow - Mule ESB
Controlling Message Flow - Mule ESBControlling Message Flow - Mule ESB
Controlling Message Flow - Mule ESBMani Rathnam Gudi
 
Mule agent notifications
Mule agent notificationsMule agent notifications
Mule agent notificationsShanky Gupta
 
Mule tcat server - Server profiles
Mule tcat server - Server profilesMule tcat server - Server profiles
Mule tcat server - Server profilesShanky Gupta
 
Cloud hub scalability and availability
Cloud hub scalability and availabilityCloud hub scalability and availability
Cloud hub scalability and availabilityShanky Gupta
 
MUnit run and wait scope
MUnit run and wait scopeMUnit run and wait scope
MUnit run and wait scopeShanky Gupta
 
MuleSoft CloudHub FAQ
MuleSoft CloudHub FAQMuleSoft CloudHub FAQ
MuleSoft CloudHub FAQShanky Gupta
 
Mule access management - Managing Environments and Permissions
Mule access management - Managing Environments and PermissionsMule access management - Managing Environments and Permissions
Mule access management - Managing Environments and PermissionsShanky Gupta
 
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...LeanIX GmbH
 
Docker 1.12 networking deep dive
Docker 1.12 networking deep diveDocker 1.12 networking deep dive
Docker 1.12 networking deep diveMadhu Venugopal
 
Cloud hub architecture
Cloud hub architectureCloud hub architecture
Cloud hub architectureShanky Gupta
 

Viewers also liked (20)

Mule Security
Mule SecurityMule Security
Mule Security
 
Mule enricher
Mule enricher Mule enricher
Mule enricher
 
Message properties component in mule
Message properties component in muleMessage properties component in mule
Message properties component in mule
 
Mule Microsoft Service Bus
Mule Microsoft Service BusMule Microsoft Service Bus
Mule Microsoft Service Bus
 
V8 Google
V8 GoogleV8 Google
V8 Google
 
Scatter and gather in mule
Scatter and gather in muleScatter and gather in mule
Scatter and gather in mule
 
DockerCon 2016 Recap
DockerCon 2016 RecapDockerCon 2016 Recap
DockerCon 2016 Recap
 
MuleSoft ESB Composite Source
MuleSoft ESB Composite SourceMuleSoft ESB Composite Source
MuleSoft ESB Composite Source
 
Controlling Message Flow - Mule ESB
Controlling Message Flow - Mule ESBControlling Message Flow - Mule ESB
Controlling Message Flow - Mule ESB
 
Mule agent notifications
Mule agent notificationsMule agent notifications
Mule agent notifications
 
Mule tcat server - Server profiles
Mule tcat server - Server profilesMule tcat server - Server profiles
Mule tcat server - Server profiles
 
Cloud hub scalability and availability
Cloud hub scalability and availabilityCloud hub scalability and availability
Cloud hub scalability and availability
 
MUnit run and wait scope
MUnit run and wait scopeMUnit run and wait scope
MUnit run and wait scope
 
Virtual box
Virtual boxVirtual box
Virtual box
 
MuleSoft CloudHub FAQ
MuleSoft CloudHub FAQMuleSoft CloudHub FAQ
MuleSoft CloudHub FAQ
 
Mule access management - Managing Environments and Permissions
Mule access management - Managing Environments and PermissionsMule access management - Managing Environments and Permissions
Mule access management - Managing Environments and Permissions
 
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
How to manage technology obsolescence with LeanIX Enterprise Architecture Man...
 
Docker 1.12 networking deep dive
Docker 1.12 networking deep diveDocker 1.12 networking deep dive
Docker 1.12 networking deep dive
 
Cloudhub and Mule
Cloudhub and MuleCloudhub and Mule
Cloudhub and Mule
 
Cloud hub architecture
Cloud hub architectureCloud hub architecture
Cloud hub architecture
 

Similar to Anypoint access management - Users

Anypoint access management
Anypoint access management Anypoint access management
Anypoint access management Shanky Gupta
 
Users and roles sitefinity guide
Users and roles  sitefinity guideUsers and roles  sitefinity guide
Users and roles sitefinity guideRoshith S Pai
 
The New Sales Navigator: Admin Training Guide
The New Sales Navigator: Admin Training GuideThe New Sales Navigator: Admin Training Guide
The New Sales Navigator: Admin Training GuideLinkedIn Sales Solutions
 
Roles and Permissions - Liferay Developer
Roles and Permissions - Liferay Developer Roles and Permissions - Liferay Developer
Roles and Permissions - Liferay Developer Attune World Wide
 
Using system administrator
Using system administratorUsing system administrator
Using system administratordrusinova
 
Admin Panel: Services
Admin Panel: Services Admin Panel: Services
Admin Panel: Services Comidor
 
Configuring Sites, Users and Groups
Configuring Sites, Users and GroupsConfiguring Sites, Users and Groups
Configuring Sites, Users and GroupsSyAM Software
 
Managing users-doc
Managing users-docManaging users-doc
Managing users-docAmit Sharma
 
Admin guide knowled base_tracker 1.1
Admin guide  knowled base_tracker 1.1Admin guide  knowled base_tracker 1.1
Admin guide knowled base_tracker 1.1Gayatri Khosla
 
ResearchReady - Invite Students to ResearchReady
ResearchReady - Invite Students to ResearchReadyResearchReady - Invite Students to ResearchReady
ResearchReady - Invite Students to ResearchReadyImagine Easy Solutions
 
Groups access rights
Groups   access rightsGroups   access rights
Groups access rightsBond Seidel
 
View Solution #48 - Email- Active Directory - Samanage
View Solution #48 - Email- Active Directory - SamanageView Solution #48 - Email- Active Directory - Samanage
View Solution #48 - Email- Active Directory - SamanageAndrew Peisner
 
Mule organization
Mule organizationMule organization
Mule organizationSon Nguyen
 
Mother May I?
Mother May I?Mother May I?
Mother May I?shaeesi
 

Similar to Anypoint access management - Users (20)

Anypoint access management
Anypoint access management Anypoint access management
Anypoint access management
 
Login page1
Login page1Login page1
Login page1
 
Users and roles sitefinity guide
Users and roles  sitefinity guideUsers and roles  sitefinity guide
Users and roles sitefinity guide
 
The New Sales Navigator: Admin Training Guide
The New Sales Navigator: Admin Training GuideThe New Sales Navigator: Admin Training Guide
The New Sales Navigator: Admin Training Guide
 
E rookie.com
E rookie.comE rookie.com
E rookie.com
 
Roles and Permissions - Liferay Developer
Roles and Permissions - Liferay Developer Roles and Permissions - Liferay Developer
Roles and Permissions - Liferay Developer
 
Liferay control pannel
Liferay control pannelLiferay control pannel
Liferay control pannel
 
Using system administrator
Using system administratorUsing system administrator
Using system administrator
 
How To Set Up Insightly CRM
How To Set Up Insightly CRMHow To Set Up Insightly CRM
How To Set Up Insightly CRM
 
Admin Panel: Services
Admin Panel: Services Admin Panel: Services
Admin Panel: Services
 
Configuring Sites, Users and Groups
Configuring Sites, Users and GroupsConfiguring Sites, Users and Groups
Configuring Sites, Users and Groups
 
How to Add / Delete User in OpenERP
How to Add / Delete User in OpenERPHow to Add / Delete User in OpenERP
How to Add / Delete User in OpenERP
 
Managing users-doc
Managing users-docManaging users-doc
Managing users-doc
 
AMS FAQ's
AMS FAQ'sAMS FAQ's
AMS FAQ's
 
Admin guide knowled base_tracker 1.1
Admin guide  knowled base_tracker 1.1Admin guide  knowled base_tracker 1.1
Admin guide knowled base_tracker 1.1
 
ResearchReady - Invite Students to ResearchReady
ResearchReady - Invite Students to ResearchReadyResearchReady - Invite Students to ResearchReady
ResearchReady - Invite Students to ResearchReady
 
Groups access rights
Groups   access rightsGroups   access rights
Groups access rights
 
View Solution #48 - Email- Active Directory - Samanage
View Solution #48 - Email- Active Directory - SamanageView Solution #48 - Email- Active Directory - Samanage
View Solution #48 - Email- Active Directory - Samanage
 
Mule organization
Mule organizationMule organization
Mule organization
 
Mother May I?
Mother May I?Mother May I?
Mother May I?
 

More from Shanky Gupta

Mule tcat server - common problems and solutions
Mule tcat server - common problems and solutionsMule tcat server - common problems and solutions
Mule tcat server - common problems and solutionsShanky Gupta
 
Mule: Munit domain support
Mule: Munit domain supportMule: Munit domain support
Mule: Munit domain supportShanky Gupta
 
Mule tcat server - Monitoring a server
Mule tcat server - Monitoring a serverMule tcat server - Monitoring a server
Mule tcat server - Monitoring a serverShanky Gupta
 
Mule tcat server - Monitoring applications
Mule tcat server - Monitoring applicationsMule tcat server - Monitoring applications
Mule tcat server - Monitoring applicationsShanky Gupta
 
Mule tcat server - deploying applications
Mule tcat server - deploying applicationsMule tcat server - deploying applications
Mule tcat server - deploying applicationsShanky Gupta
 
Mule tcat server - automating tasks
Mule tcat server - automating tasks Mule tcat server - automating tasks
Mule tcat server - automating tasks Shanky Gupta
 
Mule message structure
Mule message structureMule message structure
Mule message structureShanky Gupta
 
Mule management console Architecture
Mule management console ArchitectureMule management console Architecture
Mule management console ArchitectureShanky Gupta
 
CloudHub networking guide
CloudHub networking guideCloudHub networking guide
CloudHub networking guideShanky Gupta
 
Using mule with web services
Using mule with web servicesUsing mule with web services
Using mule with web servicesShanky Gupta
 
Mule management console
Mule management consoleMule management console
Mule management consoleShanky Gupta
 
Configuring Anypoint Studio MQ connector
Configuring Anypoint Studio MQ connectorConfiguring Anypoint Studio MQ connector
Configuring Anypoint Studio MQ connectorShanky Gupta
 
MUnit - Testing Mule
MUnit - Testing MuleMUnit - Testing Mule
MUnit - Testing MuleShanky Gupta
 
OAuth 2.0 authorization
OAuth 2.0 authorization OAuth 2.0 authorization
OAuth 2.0 authorization Shanky Gupta
 
OAuth 2.0 authentication
OAuth 2.0 authentication OAuth 2.0 authentication
OAuth 2.0 authentication Shanky Gupta
 

More from Shanky Gupta (19)

Mule tcat server - common problems and solutions
Mule tcat server - common problems and solutionsMule tcat server - common problems and solutions
Mule tcat server - common problems and solutions
 
Mule: Munit domain support
Mule: Munit domain supportMule: Munit domain support
Mule: Munit domain support
 
Mule tcat server - Monitoring a server
Mule tcat server - Monitoring a serverMule tcat server - Monitoring a server
Mule tcat server - Monitoring a server
 
Mule tcat server - Monitoring applications
Mule tcat server - Monitoring applicationsMule tcat server - Monitoring applications
Mule tcat server - Monitoring applications
 
Mule tcat server - deploying applications
Mule tcat server - deploying applicationsMule tcat server - deploying applications
Mule tcat server - deploying applications
 
Mule tcat server - automating tasks
Mule tcat server - automating tasks Mule tcat server - automating tasks
Mule tcat server - automating tasks
 
Mule message structure
Mule message structureMule message structure
Mule message structure
 
Mule management console Architecture
Mule management console ArchitectureMule management console Architecture
Mule management console Architecture
 
MUnit matchers
MUnit matchersMUnit matchers
MUnit matchers
 
CloudHub networking guide
CloudHub networking guideCloudHub networking guide
CloudHub networking guide
 
Cloudhub fabric
Cloudhub fabricCloudhub fabric
Cloudhub fabric
 
Using mule with web services
Using mule with web servicesUsing mule with web services
Using mule with web services
 
Mule management console
Mule management consoleMule management console
Mule management console
 
Configuring Anypoint Studio MQ connector
Configuring Anypoint Studio MQ connectorConfiguring Anypoint Studio MQ connector
Configuring Anypoint Studio MQ connector
 
The Mule Agent
The Mule AgentThe Mule Agent
The Mule Agent
 
MUnit - Testing Mule
MUnit - Testing MuleMUnit - Testing Mule
MUnit - Testing Mule
 
Mule testing
Mule testingMule testing
Mule testing
 
OAuth 2.0 authorization
OAuth 2.0 authorization OAuth 2.0 authorization
OAuth 2.0 authorization
 
OAuth 2.0 authentication
OAuth 2.0 authentication OAuth 2.0 authentication
OAuth 2.0 authentication
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Anypoint access management - Users

  • 1. Anypoint Access Management - USERS SHANKY GUPTA
  • 2. Assumptions  This presentation assumes that you have an Organization Administrator role in your organization, or that you have API Version Owner permissions and want to manage user permissions for your API version.
  • 3. Updating Your Own User Information  Once logged in, select Profile on the top right menu. You can easily update your basic account information from here:  There you’ll be able to modify your name, email, change your password and see a list of the roles assigned to your account.
  • 4. Managing Users  As an Admin of your organization, or of one of its business groups, you can enable, disable, or delete the users in it. Access this menu by first making sure that the correct business group is selected in the top-right of the screen next to your user name, then clicking the gear icon next to it, and then picking the Users link in the left menu.  By ticking the checkbox next to a user, a few more options related to that user are displayed, specifically:  Enable: Enables the user in the selected Organization / Business Group.  Disable: Disables the user in the selected Organization / Business Group.  Delete: Deletes the user in the selected Organization / Business Group.
  • 5. Inviting Users  As an Organization Administrator, or of one of its business groups, you can invite new users and manage existing users for your organization on the Access Management Administration page, which you can reach by selecting the Users option in your Access Management section.  In order to invite new users to your organization:  Click Users in the left navigation bar.  Click Invite user.  Enter the email addresses of who you want to invite in your organization as a comma-separated list.  Optionally, select one or more roles to which to assign these users.  Click Send Invitation.
  • 6. Inviting Users …continued  The users who you invite receive email invitations to sign up to your organization.  Invited users have access to the same set of resources as you (although they may have different roles that can restrict what they can view or do). They will receive an email inviting them, and if they click through the link they will be presented a sign-up form that already has the Company field completed, matching your organization.
  • 7. Resend or cancel a sent invitation  Click Pending Invites to view all invitations that have not yet been accepted. Select the ones you need to manage, and click Re-send Invite or Cancel Invite.
  • 8. Granting Permissions and Roles to Users  By clicking on a username you can access more information about that user, add roles and permissions to it, or reset its password.
  • 9. Granting Permissions and Roles to Users …continued  By default in every new organization and business group when first created, you get three options:  Assign API Permissions: write the name of the API you want to give access to, then pick a version and permission.  Assign Runtime Manager Permissions: write the name of the Runtime Manager environment to want to give access to, then pick a permission  Assign Roles: write the name of the role you want to grant. Check the roles section for a description of the default roles within an organization and business group.  Roles and permissions are grouped under organizations (and optionally under business groups too). This means that you can only assign roles and permissions that are related to resources that exist in the organization and/or business group that you are selecting.  If necessary, you can also remove user permissions, but keep in mind that if users have been granted their permission via a role, you cannot view or remove those role-based permissions here, you must do it via the Roles section.fs