MikroTik Certified User Management Engineer (MTCUME)
1 Introduction to MikroTik
1-1 Overview of MikroTik products
1-2 MikroTik RouterOS basics
1-3 MikroTik hardware overview
1-4 MikroTik software overview
2 User Management Fundamentals
2-1 Understanding user roles and permissions
2-2 Creating and managing users
2-3 User groups and their usage
2-4 Password policies and security
3 Advanced User Management
3-1 Implementing role-based access control (RBAC)
3-2 Customizing user profiles
3-3 User authentication methods
3-4 Integrating external authentication sources
4 User Access Control
4-1 Configuring access lists (ACLs)
4-2 Managing user access to resources
4-3 Time-based access control
4-4 Monitoring and logging user activities
5 User Management in Network Services
5-1 User management in DHCP
5-2 User management in VPN
5-3 User management in firewall
5-4 User management in hotspot
6 User Management in Cloud
6-1 Introduction to MikroTik Cloud
6-2 Managing users in MikroTik Cloud
6-3 Integrating Cloud services with user management
6-4 Security considerations in Cloud user management
7 Troubleshooting User Management
7-1 Common user management issues
7-2 Debugging user authentication problems
7-3 Resolving access control issues
7-4 Performance optimization in user management
8 Best Practices and Compliance
8-1 Best practices in user management
8-2 Compliance with industry standards
8-3 Auditing user management configurations
8-4 Continuous improvement in user management
Understanding User Roles and Permissions

Understanding User Roles and Permissions

Key Concepts

In MikroTik RouterOS, user roles and permissions are fundamental for managing access to the device's features and configurations. This section will cover the essential concepts related to user roles and permissions, including users, groups, and permissions.

1. Users

Users are individual accounts that can log into the MikroTik device. Each user has a unique username and password. Users can be assigned specific roles and permissions, determining what actions they can perform on the device.

For example, you might have a user named "admin" with full access to all features, and another user named "tech" with limited access to troubleshooting tools only.

2. Groups

Groups are collections of users that share common permissions. Instead of assigning permissions to each user individually, you can assign permissions to a group, and then add users to that group. This simplifies the management of permissions, especially in larger networks.

Imagine a group as a department in a company. Just as employees in the IT department share common responsibilities, users in a "NetworkAdmins" group share common permissions to manage the network.

3. Permissions

Permissions define what actions a user or group can perform on the MikroTik device. Permissions can be granular, allowing you to control access to specific features, commands, or even individual settings. Common permissions include read, write, and full access.

Think of permissions as keys to different rooms in a house. Just as a key allows you to enter a specific room, a permission allows a user to access a specific feature or configuration on the device.

Examples and Analogies

To better understand user roles and permissions, consider the following examples:

Example 1: User with Limited Access

You create a user named "guest" and assign them to a group called "Visitors." The "Visitors" group has read-only permissions for basic network information, such as IP addresses and interface status. The "guest" user can view this information but cannot make any changes.

Example 2: Group with Full Access

You create a group named "NetworkAdmins" and assign full access permissions to all network-related features. You then add users like "admin" and "tech" to this group. Both users can perform any action on the network, from configuring interfaces to managing firewall rules.

Example 3: Granular Permissions

You create a user named "support" and assign them permissions to only view and restart specific interfaces. This ensures that the "support" user can troubleshoot connectivity issues without making any other changes to the network configuration.

Conclusion

Understanding user roles and permissions is crucial for securing and managing MikroTik devices. By defining users, groups, and permissions, you can control access to the device's features and configurations, ensuring that only authorized users can perform specific actions. This not only enhances security but also simplifies the management of large networks.