What is Global Management (Ghippo)?¶
Global Management (Ghippo) is a comprehensive user-centered service that includes access control, enterprise space, audit logs, platform settings, and other fundamental modules.
-
Access Control: Helps users manage access to resources. Users can create, manage, and delete users/groups, and configure user/group permissions to divide users' functional rights flexibly.
-
Enterprise Space: A resource isolation unit with a hierarchical structure and capability of access control. Users can set up a hierarchical structure depending on the development environment, department structure, etc., and control who has access to which resources.
-
Audit Logs: Provides operation logs of resources that allow security analysis, resource changes, problem location, and other essential insights.
-
Platform Settings: Platform security policy, mail server, appearance customization, and more ensure secure user information and a personalized experience.
Benefits¶
-
All Services Under One Menu
The basic service modules of the platform are brought together to reduce the troubles caused by menu switching and feature scattering. Platform administrators can complete basic settings and user management under one menu.
-
Combination of Users and Tenants
Flat management of users and groups as well as hierarchical tenant (workspace) collaboration enable multi-dimensional and multi-scenario access control based on the platform and resource-based feature division.
-
Personalization
Support personalized platform appearance, including custom login page, and top navigation bar. Easily configure a unique platform through visual pages.
-
Beginner Friendly
Most of the configuration has been done for users in advance, including password rules, session timeout policies, etc., simplifying user operations and making it ready to use.
Procedure¶
-
Log in to the DCE platform using the DCE platform administrator (Admin) or a user with Admin privileges.
-
Go to
Access Control
. Create users and authorize, then create groups and authorize, and eventually, create an identity provider. -
Go to
Workspace
. Create enterprise hierarchy relationship, then create a workspace (tenant). -
Go to
Audit Logs
. View and export audit logs. -
Go to
Platform Settings
. Configure security policy, mail server, appearance, and genuine license.