The following table explains policies governing Enterprise and Group Authenticator rights and privileges.
|
Policy Name |
Description |
Value Range and Default |
|---|---|---|
|
Add Devices |
Specify whether Enterprise and Group Authenticators are allowed to add devices. |
Yes, No Default: No |
|
Add Users |
Specify whether Enterprise and Group Authenticators are allowed to add new users. |
Yes, No Default: No |
|
Add Users to Enterprise |
Specify whether Enterprise and Group Authenticators are allowed to add new users to the enterprise. |
Yes, No Default: No |
|
Add/Modify Groups |
Specify whether Enterprise and Group Authenticators are allowed to add/modify subgroups. |
Yes, No Default: No |
|
Copy/Paste Groups |
Specify whether Enterprise and Group Authenticators are allowed to copy and paste subgroups. |
Yes, No Default: No |
|
Remove Devices |
Specify whether Enterprise and Group Authenticators are allowed to remove devices. |
Yes, No Default: No |
|
Remove Groups |
Specify whether Enterprise and Group Authenticators are allowed to remove subgroups. |
Yes, No Default: No |
|
Remove Users |
Specify whether Enterprise and Group Authenticators are allowed to remove users. |
Yes, No Default: No |
|
Remove Users from Enterprise |
Specify whether Authenticators are allowed to remove users from the enterprise. |
Yes, No Default: No |
