Advanced User Management
This page is not applicable to Planview Hub Cloud.
Advanced User Management
Planview Hub has advanced user management capabilities that are not accessible via the Hub interface.
To access advanced user management capabilities, click the User Administration Console link at the bottom of the Hub login screen.
You can log in using the credentials you set when you first installed and began using Planview Hub.
WARNING: There is only one initial root user. If the credentials for this user are lost, access to the advanced User Management features will be lost. All functionality of Planview Hub, however, will continue uninterrupted.
Some of the advanced features include:
- User Federation Configuration for:
- LDAP
- Kerberos
- Identity Provider login for:
- SAML v2.0
- OpenID Connect v1.0
- Enforcing custom password policies such as:
- Set password expiration
- Require special characters
- Setting minimum password length
Note: While Planview Hub officially supports LDAP, other advanced features (including but not limited to Kerberos Federation and IDP) are not supported or tested by Planview.
To learn more about these advanced features, click here.
WARNING: Do not make changes or updates to the Roles or Groups section. Altering these settings may prevent your Planview Hub users from accessing the tool.
Creating and Managing Root Users
A root user refers to a user who can log in to the User Administration Console. Hub comes with one root user, but if you'd like to create additional root users or to manage existing users, you can do so from the User Administration Console.
Once logged in, click the arrow next to Tasktop (in the upper left panel) and select master.
Next, click Users in the left panel.
From here, you can follow the same instructions used to create Hub users to create and manage root users.
Creating the Troubleshooting User Role using a Script
To configure the troubleshooting user role, we provide a script that will create the TasktopTroubleshootingUser role in your Keycloak instance, and replace the default TasktopUsers group with the TasktopTroubleshootingUsers group.
Note: This script can only be used if you have provided a valid SSL certificate as described in the SSL Certificate Installation section. If you have not provided such a certificate, skip to the Creating the troubleshooting user role via the Keycloak admin console section below.
Windows
Run the add-troubleshooting-user.bat
script in C:\Program Files\Tasktop\utility-scripts
, providing the relevant information when prompted.
Linux
Run the add-troubleshooting-user.sh
script in <installation location>/Tasktop/utility-scripts
, providing the relevant information when prompted.
Creating the Troubleshooting User Role via the Keycloak Admin Console
If you have not provided a valid SSL certificate, you can create a troubleshooting user via the User Administration Console. This console can be accessed by following the instructions in the Getting Started section.
After logging in, navigate to the Realm roles section in the left column and click Create role.
On this screen, enter TasktopTroubleshootingUser in the Role name field. Then, click Save.
Tip: The Role name is case-sensitive and must match exactly.
That's it! The troubleshooting user role has been created. Next, you'll need to add the troubleshooting user to a group.
Adding Troubleshooting Users to a Group
We recommend that you create a group for troubleshooting users and set it as the default group.
To do this, navigate to the Groups section in the left column and click Create group.
On the Create a group screen, enter TasktopTroubleshootingUsers in the Name field. Then, click Create.
After saving the group, the new group screen will appear.
Next, click on the newly-created TasktopTroubleshootingUsers, select the Role mapping tab at the top and then click on the Assign role button below.
Check the box next to TasktopTroubleshootingUser and click Assign.
After you have added the user to Assigned Roles, select Realm settings in the left column.
Click the User registration tab at the top, and then the Default groups option below.Remove any existing groups under Default groups.
TasktopTroubleshootingUsers.
19.4 - 21.1
Advanced User Management
Planview Hub has advanced user management capabilities that are not accessible via the Hub interface.
To access advanced user management capabilities, click the User Administration Console link at the bottom of the Hub login screen.
You can log in using the credentials you set when you first installed and began using Planview Hub.
WARNING: There is only one initial root user. If the credentials for this user are lost, access to the advanced User Management features will be lost. All functionality of Planview Hub, however, will continue uninterrupted.
Some of the advanced features include:
- User Federation Configuration for:
- LDAP
- Kerberos
- Identity Provider login for:
- SAML v2.0
- OpenID Connect v1.0
- Enforcing custom password policies such as:
- Set password expiration
- Require special characters
- Setting minimum password length
Note: While Planview Hub officially supports LDAP, other advanced features (including but not limited to Kerberos Federation and IDP) are not supported or tested by Planview.
To learn more about these advanced features, click here.
WARNING: Do not make changes or updates to the Roles or Groups section. Altering these settings may prevent your Planview Hub users from accessing the tool.
Creating and Managing Root Users
A root user refers to a user who can log in to the User Administration Console. Hub comes with one root user, but if you'd like to create additional root users or to manage existing users, you can do so from the User Administration Console.
Once logged in, click the arrow next to Tasktop (in the upper left panel) and select master.
Next, click Users in the left panel.
From here, you can follow the same instructions used to create Hub users to create and manage root users.
Creating the Troubleshooting User Role using a Script
To configure the troubleshooting user role, we provide a script that will create the TasktopTroubleshootingUser role in your Keycloak instance, and replace the default TasktopUsers group with the TasktopTroubleshootingUsers group.
Note: This script can only be used if you have provided a valid SSL certificate as described in the SSL Certificate Installation section. If you have not provided such a certificate, skip to the Creating the troubleshooting user role via the Keycloak admin console section below.
Windows
Run the add-troubleshooting-user.bat
script in C:\Program Files\Tasktop\utility-scripts
, providing the relevant information when prompted.
Linux
Run the add-troubleshooting-user.sh
script in <installation location>/Tasktop/utility-scripts
, providing the relevant information when prompted.
Creating the Troubleshooting User Role via the Keycloak Admin Console
If you have not provided a valid SSL certificate, you can create a troubleshooting user via the User Administration Console. This console can be accessed by following the instructions in the Getting Started section.
After logging in, navigate to the Realm roles section in the left column and click Create role.
On this screen, enter TasktopTroubleshootingUser in the Role name field. Then, click Save.
Tip: The Role name is case-sensitive and must match exactly.
That's it! The troubleshooting user role has been created. Next, you'll need to add the troubleshooting user to a group.
Adding Troubleshooting Users to a Group
We recommend that you create a group for troubleshooting users and set it as the default group.
To do this, navigate to the Groups section in the left column and click Create group.
On the Create a group screen, enter TasktopTroubleshootingUsers in the Name field. Then, click Create.
After saving the group, the new group screen will appear.
Next, click on the newly-created TasktopTroubleshootingUsers, select the Role mapping tab at the top and then click on the Assign role button below.
Check the box next to TasktopTroubleshootingUser and click Assign.
After you have added the user to Assigned Roles, select Realm settings in the left column.
Click the User registration tab at the top, and then the Default groups option below.Remove any existing groups under Default groups.
TasktopTroubleshootingUsers.
19.4 - 21.1
Advanced User Management
Planview Hub has advanced user management capabilities that are not accessible via the Hub interface.
To access advanced user management capabilities, click the User Administration Console link at the bottom of the Hub login screen.
You can log in using the credentials you set when you first installed and began using Planview Hub.
WARNING: There is only one initial root user. If the credentials for this user are lost, access to the advanced User Management features will be lost. All functionality of Planview Hub, however, will continue uninterrupted.
Some of the advanced features include:
- User Federation Configuration for:
- LDAP
- Kerberos
- Identity Provider login for:
- SAML v2.0
- OpenID Connect v1.0
- Enforcing custom password policies such as:
- Set password expiration
- Require special characters
- Setting minimum password length
Note: While Planview Hub officially supports LDAP, other advanced features (including but not limited to Kerberos Federation and IDP) are not supported or tested by Planview.
To learn more about these advanced features, click here.
WARNING: Do not make changes or updates to the Roles or Groups section. Altering these settings may prevent your Planview Hub users from accessing the tool.
Creating and Managing Root Users
A root user refers to a user who can log in to the User Administration Console. Hub comes with one root user, but if you'd like to create additional root users or to manage existing users, you can do so from the User Administration Console.
Once logged in, click the arrow next to Tasktop (in the upper left panel) and select master.
Next, click Users in the left panel.
From here, you can follow the same instructions used to create Hub users to create and manage root users.
Creating the Troubleshooting User Role using a Script
To configure the troubleshooting user role, we provide a script that will create the TasktopTroubleshootingUser role in your Keycloak instance, and replace the default TasktopUsers group with the TasktopTroubleshootingUsers group.
Note: This script can only be used if you have provided a valid SSL certificate as described in the SSL Certificate Installation section. If you have not provided such a certificate, skip to the Creating the troubleshooting user role via the Keycloak admin console section below.
Windows
Run the add-troubleshooting-user.bat
script in C:\Program Files\Tasktop\utility-scripts
, providing the relevant information when prompted.
Linux
Run the add-troubleshooting-user.sh
script in <installation location>/Tasktop/utility-scripts
, providing the relevant information when prompted.
Creating the Troubleshooting User Role via the Keycloak Admin Console
If you have not provided a valid SSL certificate, you can create a troubleshooting user via the User Administration Console. This console can be accessed by following the instructions in the Getting Started section.
After logging in, navigate to the Realm roles section in the left column and click Create role.
On this screen, enter TasktopTroubleshootingUser in the Role Name field. Then, click Save.
Tip: The Role name is case-sensitive and must match exactly.
That's it! The troubleshooting user role has been created. Next, you'll need to add the troubleshooting user to a group.
Adding Troubleshooting Users to a Group
We recommend that you create a group for troubleshooting users and set it as the default group.
To do this, navigate to the Groups section in the left column and click Create group.
On the Create a group screen, enter TasktopTroubleshootingUsers in the Name field. Then, click Create.
After saving the group, the new group screen will appear.
Next, click on the newly-created TasktopTroubleshootingUsers, select the Role mapping tab at the top and then click on the Assign role button below.
Check the box next to TasktopTroubleshootingUser and click Assign.
After you have added the user to Assigned Roles, select Realm settings in the left column.
Click the User registration tab at the top, and then the Default groups option below.Remove any existing groups under Default groups.
TasktopTroubleshootingUsers.