I work in a secured IT environment that consists of several air-gapped systems or domains. We utilize Solarwinds, majority of work is done in NPM and NCM. Our main polling engine sits inside air-gapped system 1, yet it monitors devices within all 6 systems. Any individual or group account on our instance with full admin rights will have access to all SW modules, as well as access to make changes to all 6 systems and the devices within. I need to grant admin rights to several team members from System 4, however, our security protocol states those particular team members should only have read-write capabilities within their own prescribed system. Is there a way to make this work where team 4 admins only have full rights within their own system?
i.e.
10.150.0.0/16 | AG System 1 | Main Polling Engine | Architect | | | | | | |
10.151.0.0/16 | AG System 2 | AE 1 | Admin | | | | | | |
10.152.0.0/16 | AG System 3 | AE 2 | Read Only | | | | | | |
10.153.0.0/16 | AG System 4 | AE 3 | Read Only | I need this team to have read-write access but only for this block |
10.154.0.0/16 | AG System 5 | AE 4 | Read Only | | | | | | |
10.155.0.0/16 | AG System 6 | AE 5 | Read Only | | | | | | |