The following table details the actions for each object in the cluster, for each of which permission may be assigned. This results in a high level of control over actions at multiple levels.
Table 6.2. Permissions Actions on Objects
| Object | Action |
|---|---|
| System - Configure RHS-C | Manipulate Users, Manipulate Permissions, Manipulate Roles, Generic Configuration |
| Cluster - Configure Cluster | Create, Delete, Edit Cluster Properties, Edit Network |
| Server - Configure Server | Create, Delete, Edit Host Properties, Manipulate Status, Edit Network |
| Gluster Storage - Configure Gluster Storage | Create, Delete, Edit Volumes, Volume Options, Manipulate Status |