The following table explains policies governing Enterprise and Group Authenticator rights and privileges.
Policy Name |
Description |
Value Range and Default |
---|---|---|
Add Devices |
Specify whether Enterprise and Group Authenticators are allowed to add devices. |
Yes, No Default: No |
Add Users |
Specify whether Enterprise and Group Authenticators are allowed to add new users. |
Yes, No Default: No |
Add Users to Enterprise |
Specify whether Enterprise and Group Authenticators are allowed to add new users to the enterprise. |
Yes, No Default: No |
Add/Modify Groups |
Specify whether Enterprise and Group Authenticators are allowed to add/modify subgroups. |
Yes, No Default: No |
Copy/Paste Groups |
Specify whether Enterprise and Group Authenticators are allowed to copy and paste subgroups. |
Yes, No Default: No |
Remove Devices |
Specify whether Enterprise and Group Authenticators are allowed to remove devices. |
Yes, No Default: No |
Remove Groups |
Specify whether Enterprise and Group Authenticators are allowed to remove subgroups. |
Yes, No Default: No |
Remove Users |
Specify whether Enterprise and Group Authenticators are allowed to remove users. |
Yes, No Default: No |
Remove Users from Enterprise |
Specify whether Authenticators are allowed to remove users from the enterprise. |
Yes, No Default: No |