Sonatype

Sonatype Nexus Repository product logo

Users, Roles, Privileges

Current Status
Not Enrolled
Price
Free
Get Started

Course Goals

Learners will successfully streamline the administration and management of access control in NXRM3 by using best practices when creating and managing users, privileges, and roles. This will be accomplished by understanding privileges and their actions when assigned to users and roles, and how those are used to create protected repositories for multiple departments or development groups.

Objectives

By the end of this course, you will be able to…

  • Identify the default users, roles, and key built-in privileges.
  •  Create and manage users.
  •  Create and manage roles.
  •  Map NXRM roles to external user groups (LDAP in this example).
  •  Assign privileges and users to roles.

Prerequisites

This lesson assumes learners are familiar with all of the concepts covered in the Security Essentials course .

Target Audience

The target audience for this course is the Repository Administrator, and anyone who wants to learn more about users, roles, and privileges in the NXRM3 security model.

Estimated Time to Complete

30 minutes

System Requirements

Demo version of NXRM3 – Download and install a test environment for the purpose of this lesson if you do not already have one installed.

The Sonatype platform is available in cloud, self-hosted, and disconnected deployment options. Be advised that the visuals in this course could be sourced from any (or all) of the three. The screens may have a different display, but the content and concepts remain generally the same.

Setting Expectations

We will discuss in depth how to create and manage users, privileges, and roles in order to manage security and access control of your NXRM3. We will also touch on, but not take a deep dive into:

  • Configuring LDAP (realms)
  • Architecture options for NXRM3
  • Common NXRM architectures

As these are all critical aspects of the NXRM security model, they will be covered in greater detail in separate courses.

Refer to our Glossary for more information on any of the terms used throughout this course.

Ratings and Reviews

4.9
Avg. Rating
10 Ratings
5
9
4
1
3
0
2
0
1
0
What's your experience? We'd love to know!
Akshaya
Posted 8 months ago
Understanding NXRM Security Model

Great course for understanding Nexus user identity and privileges.

×
Preview Image
Kouakou Kan Franck Ambroise
Posted 10 months ago
great !

Great course

×
Preview Image
Daniel
Posted 1 year ago
N/A

N/A

×
Preview Image
Nina
Posted 1 year ago
Very basic course

Very basic course and good start

×
Preview Image
Jeff
Posted 1 year ago
Users, Roles, and Permissions Explained

Lesson clearly explained the relationships between users, roles, groups, permissions, and LDAP group mappings.

×
Preview Image
Liu
Posted 2 years ago
Great lessons

Great lessons

×
Preview Image
xavier
Posted 2 years ago
Review

Good

×
Preview Image
Alexander
Posted 2 years ago
A great practical intro

It worth to take after finishing the security essentials course. A learner will see how all the concept working. Thank you!

×
Preview Image
John
Posted 3 years ago
Very helpful for understanding and working with Roles and privledges

very well laid and an easy to understand

×
Preview Image
Michael
Posted 3 years ago
Ideal for the administrator

It helped me understand the distinction between privileges and roles. I was able to setup my LDAP groups and map the roles to them right afterwards.

×
Preview Image
Show more reviews
What's your experience? We'd love to know!