Using Secure Admin, Johns Hopkins implemented a least privileged access model. Specific users were granted tailored permissions based on their roles some only needed access to third-party configuration pages, others to user management and some to manage custom fields. Access was provisioned on a case by case basis using Secure Admin’s granular control capabilities.
This configuration allowed trusted power users to maintain the access they needed without compromising system security. It streamlined internal workflows by eliminating the need for these users to rely on full admins for every task. As a result, central admins could focus on higher priority issues while reducing the risk of unauthorized changes or misconfigurations.
Company Xyz operates in two countries: the USA and New Zealand. Some projects in the USA require high security clearance and can only be accessed by authorized staff. Due to time zone differences, Jira admins are present in both countries, but only the USA admin has access to the high-security projects.
The challenge is to manage different access privileges for Jira admins without allowing them to grant themselves unauthorized access.
Secure Admin ensures that the New Zealand admin is restricted from accessing specific high-security projects and cannot grant access to themselves or other users. The USA admin, who possesses high-level security clearance, is responsible for assigning all project access.
Secure Admin is installed, and the USA admin is granted super user access in the Secure Admin configuration page. The New Zealand admin is given access to all menus except the following:
User management, including adding new users, is handled entirely by the USA admin. This ensures that each user is properly vetted for the appropriate security clearance.
Company Xyz has two very senior admins and are training an employee for tier 1 items. They want to make sure the new employee doesn’t accidentally cause damage
Company Xyz installs Secure Admin, designating two senior admins as super users. The trainee receives access to screens incrementally, only gaining access to new areas after mastering the current ones. This ensures they only access functionalities they have been trained in. Access levels can be restricted to specific areas where the other admins need assistance.
Company Xyz installs Secure Admin and designates the two senior admins as super users. The trainee is granted access to screens on a staggered basis, receiving access to new areas only after mastering the current ones. This approach ensures that they only gain access to functionalities they have been trained in.
Access levels can be restricted to specific areas where the other two admins need assistance.