shell bypass 403

Cubjrnet7 Shell

: /opt/acronis/var/aakore/ [ drwxr-xr-x ]

name : roles.yaml
access_policy_register: access_policy_admin

# Lists of all well-known roles and their implications:
#
# Here 'well-known' means that these roles are used either without reference to a resource server,
# or with the reference equal to 'tenant-id'.
#
# Role names starting with exclamation mark (!) are special:
#  - if such a name is present in definition of a composite user role whose name coincides with part
#    of the special name that follows exclamation mark, this is so-called self-reference role (e.g.,
#    !root_admin in definition of root_admin role).
#  - if such a name is encountered in list of 'implied access policies for registered entity' of a
#    resource server or a client, corresponding composite user role is added to server's/client's
#    access token 'as-is', without being expanded to list of its constituent roles.
#
# It looks like these not expanded composite roles are needed to support certain services that only
# check caller's access token for presence of certain composite roles but not their equivalent
# implied roles.
roles:
  # user composite roles
  root_admin: [ tenant_admin, user_admin, "!root_admin", backup_admin, dr_infra_admin, dr_admin, backup_storage_admin, "agent_manager::admin", "storage_migration::root" ]
  partner_admin: [ tenant_admin, user_admin, "!partner_admin", backup_admin, dr_infra_admin, dr_admin, backup_storage_admin, "agent_manager::admin", "storage_migration::admin" ]
  company_admin: [ tenant_admin, user_admin, backup_admin, access_policy_admin, "!company_admin", dr_admin, backup_storage_admin, "agent_manager::admin", unit_admin ]
  unit_admin: [ tenant_admin, user_admin, backup_admin, "!unit_admin", backup_storage_admin ]
  backup_user: [ backup_admin, "!backup_user" ] # bad hacky role, MUST be replaced by normal backup self-service role
  # total_protection_admin: [ backup_admin, security_admin ]
  backup_admin: [ backup_agent_admin, tenant_viewer, "task_manager::viewer","task_manager::issuer", "credentials_store::owner",
    "resource_manager::admin", "policy_manager::admin", "vault_manager::admin", "alert_manager::admin", "storage::readwrite",
    "agent_manager::agent_unregistrator", "agent_manager::agent_unregistrar",
    "agent_manager::agent_viewer", "apn::requestor", "scan_service::admin",
    "agent_manager::host_manager", "index_manager::admin", "!backup_admin",
    "credentials_store::admin", "storage::storage_readwrite" ]
  # backup_user
  # security_admin: [ security_agent_admin ]
  backup_agent_admin: [ "oauth2_client_admin(backup_agent)", "resource_manager::admin",
    "agent_manager::agent_registrator", "agent_manager::agent_registrar"
  ]
  # security_agent_admin: [ oauth2_client_admin ]
  backup_storage_admin: [ "oauth2_client_admin(backup_storage)", infra_admin ]
  hci_admin: [ backup_storage_admin ]
  dr_admin: [ "oauth2_client_admin(dr)", "dr_service::admin" ]
  dr_infra_admin: [ "oauth2_client_admin(dr_infra_admin)", "!dr_infra_admin" ]
  # ap_security_agent: []
  backup_storage_engine: [ usage_reporter ]
  tenant_admin: [ tenant_viewer , "!tenant_admin"] # manage (create, update, delete) tenants, tenant settings (incl branding etc), licenses/quotas in tenant

  # atomic roles (set of permissions)
  tenant_viewer: [] # read access to tenants
  user_admin: [] # manage (create, update, delete) users, user groups and user access policies in tenant
  oauth2_client_admin: [] # manage (create, update, delete) OAuth2 clients and associated access policies in tenant
  usage_reporter: [] # report (update) usage in tenant
  infra_admin: [] # manage (create, update, delete) storage installations in tenant

  # legacy roles
  storage_readonly: [ "storage::readonly" ]
  storage_readwrite: [ "storage::readwrite" ]
  storage_replication_master: [ "storage::replication_master" ]
  anonymous: [ "oauth2_client_admin(backup_agent)", "oauth2_client_admin(backup_storage)", "!anonymous", "agent_manager::agent_registrator", "agent_manager::agent_registrar" ]

# resource servers defines how (with what access) different services must register and what access policies this services will get in their Access Tokens
# the format is the following:
#
# service_name:  <- name of the service
#   implied_access_policies_for_registered_entity:    <- list of policies that will be implicitly added to any token issued for the service
#     - { role: "task_manager::issuer", path: "some_queue" }
#   roles: <- list of roles defines with this resource server (in the scope of this resource server)
#     role1: [] <- some role
#     role2: [service_name::role1]  <- some role with implication to the role of the same service
#
resource_servers:

  hierarchy_resolver:
    roles:
      consumer: []

  dr_service:
    implied_access_policies_for_registered_entity:
      - "apn::requestor"
      - "credentials_store::owner"
      - "oauth2_client_admin(dr)"   # to be able to re-register VPN server client when migrating a tenant
      - "policy_manager::admin"
      - "resource_manager::admin"
      - "scheduler::admin"
      - "task_manager::trusted_viewer"
      - "task_manager:dr-service:consumer"
      - "task_manager:dr-service:issuer"
      - "task_manager:dr-vpn-service:issuer"
      - "task_manager:runvm_delta_create:issuer"
      - "task_manager:runvm_delta_delete:issuer"
      - "task_manager:runvm_gateway:issuer"
      - "task_manager:runvm_vm_create:issuer"
      - "task_manager:runvm_vm_delete:issuer"
      - "task_manager:runvm_vm_finalize:issuer"
      - "vault_manager::admin"
      - "tenant_viewer"
      - "task_manager:queue_run_vm_to_drc:issuer"
      - "task_manager:queue_finalize_vm_in_drc:issuer"
      - "task_manager:queue_delete_prepared_for_dr:issuer"
      - "task_manager:queue_prepare_for_dr:issuer"
      - "task_manager:queue_unmount_vm_in_drc:issuer"
      - "task_manager:queue_unmount_vm:issuer"
      - "task_manager::viewer"
    roles:
      admin: [] # manage DR in company
      vpn_appliance: [] # role for VPN Appliance
      vpn_server: [] # role for VPN Server

  runbook_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager:queue_runbooks:issuer"
      - "task_manager:queue_runbooks:consumer"
      - "dr_service::admin"
      - "task_manager::trusted_viewer"
      - "tenant_viewer"
      - "task_manager::viewer"
    roles:
      admin: []

  provision_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager:dr-service:issuer"
      - "task_manager:queue_catalog_decommission_tasks:issuer"
      - "task_manager:queue_catalog_decommission_tasks:viewer"
      - "tenant_viewer"
    roles:
      admin: []

  resource_manager:
    implied_access_policies_for_registered_entity:
      - "hierarchy_resolver::consumer"
      - "task_manager:rm_decommission:consumer"
      - "tenant_viewer"
    roles:
      admin: [] # manage (register, update, unregister) resources, alias for c2c_resource_manager::admin(tenant), computer_resource_manager::admin(tenant)

  zmqgw:
    implied_access_policies_for_registered_entity:
      - "credentials_store::consumer"
      - "vault_manager::admin"
      - "resource_manager::admin"
      - "policy_manager::admin"
      - "policy_management::read"
      - "task_manager::importer"
      - "task_manager::viewer"
      - "tenant_viewer"
    roles:
      admin: []

  ams:
    implied_access_policies_for_registered_entity:
      - "credentials_store::consumer"
      - "vault_manager::admin"
      - "resource_manager::admin"
      - "policy_manager::admin"
      - "task_manager::issuer"
      - "task_manager::viewer"
      - "tenant_admin"
    roles:
      admin: []

  backup_notification_service:
    implied_access_policies_for_registered_entity:
      - "tenant_viewer"
    roles:
      admin: []

  wb_migration:
    implied_access_policies_for_registered_entity:
      - "credentials_store::owner"
      - "website_backup_manager::admin"
      - "tenant_viewer"
    roles:
      admin: []

  task_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager::cluster_sync"
      - "hierarchy_resolver::consumer"
      - "tenant_viewer"
    roles:
      viewer: [] # list tasks (without taking into account which task queues they belongs) in tenant
      issuer: [] # push tasks into a specific task queue in tenant
      consumer: [] # pop task from a specific task queue in tenant
      admin: [] # full access
      downstream_sync: [] # accept tasks from downstream Task Manager services
      cluster_sync: [] # sync state in a Task Manager cluster

  scheduler:
    implied_access_policies_for_registered_entity:
      - "policy_manager::admin"
      - "vault_manager::admin"
      - "tenant_viewer"
    roles:
      admin: []

  credentials_store:
    implied_access_policies_for_registered_entity:
      - "hierarchy_resolver::consumer"
      - "task_manager:credentials_decommission:consumer"
      - "tenant_viewer"
    roles:
      admin: []    # access rights to read credentials object metadata (not secret) and add external ids
      consumer: [] # full read access plus access to read the credentials object secret
      owner: []    # full credentials object management access rights, with the exception of reading the secret

  alert_inspector:
    implied_access_policies_for_registered_entity:
      - "task_manager::issuer"
      - "policy_manager::admin"
      - "resource_manager::admin"
      - "alert_manager::admin"
      - "tenant_viewer"

  policy_manager:
    roles:
      admin: []

  frs:
    roles:
      admin: []

  corp-wl:
    roles:
      admin: []

  bitdefender-cleanset:
    roles:
      admin: []

  endpoint_protection_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager:dr_backup_queue:issuer"
      - "task_manager:cleanup:issuer"
      - "task_manager::trusted_viewer"
      - "task_manager::importer"
      - "task_manager::issuer"
      - "task_manager::consumer"
      - "scheduler::admin"
      - "vault_manager::admin"
      - "resource_manager::admin"
      - "policy_manager::admin"
      - "alert_manager::admin"
      - "oauth2_client_admin(backup_agent)"
      - "tenant_viewer"
      - "apn::requestor"

  backup_policy_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager:dr_backup_queue:issuer"
      - "task_manager:cleanup:issuer"
      - "scheduler::admin"
      - "vault_manager::admin"
      - "resource_manager::admin"
      - "policy_manager::admin"
      - "tenant_viewer"

  virtual_policy_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager::issuer"
      - "scheduler::admin"
      - "vault_manager::admin"
      - "resource_manager::admin"

  eapp_policy_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager::issuer"
      - "scheduler::admin"
      - "vault_manager::admin"
      - "resource_manager::admin"

  archive_policy_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager::issuer"
      - "scheduler::admin"
      - "vault_manager::admin"
      - "tenant_viewer"

  archive_browse_service:
    implied_access_policies_for_registered_entity:
      - "storage::readonly"
      - "notary::admin"
      - "tenant_viewer"

  c2c_archmgmt_agent:
    implied_access_policies_for_registered_entity:
      - "storage::readwrite"
      - "task_manager:queue_c2c_retention:consumer"
      - "task_manager:queue_c2c_migration:consumer"
      - "task_manager::trusted_viewer"
      - "c2c_backup_manager::admin"
      - "vault_manager::admin"
      - "tenant_viewer"

  o365_c2c_backup_agent:
    implied_access_policies_for_registered_entity:
      - "storage::readwrite"
      - "task_manager:queue_o365_backup:consumer"
      - "task_manager:queue_o365_backup_inc:consumer"
      - "task_manager:queue_o365_restore:consumer"
      - "task_manager:queue_o365_discovery:consumer"
      - "task_manager::trusted_viewer"
      - "c2c_backup_manager::admin"
      - "vault_manager::admin"
      - "notary::admin"
      - "tenant_viewer"

  gsuite_c2c_backup_agent:
    implied_access_policies_for_registered_entity:
      - "storage::readwrite"
      - "task_manager:queue_gsuite_backup:consumer"
      - "task_manager:queue_gsuite_backup_inc:consumer"
      - "task_manager:queue_gsuite_restore:consumer"
      - "task_manager:queue_gsuite_discovery:consumer"
      - "task_manager::trusted_viewer"
      - "c2c_backup_manager::admin"
      - "vault_manager::admin"
      - "notary::admin"
      - "tenant_viewer"
      - "task_manager:queue_gsuite:consumer"

  email_archiver:
    implied_access_policies_for_registered_entity:
      - "storage::readwrite"
      - "task_manager:queue_email_archiver_restore:consumer"
      - "task_manager::trusted_viewer"
      - "c2c_backup_manager::admin"
      - "vault_manager::admin"
      - "tenant_viewer"

  website_c2c_backup_agent:
    implied_access_policies_for_registered_entity:
      - "storage::readwrite"
      - "task_manager:queue_website:consumer"
      - "task_manager::trusted_viewer"
      - "website_backup_manager::admin"
      - "vault_manager::admin"
      - "credentials_store::consumer"
      - "tenant_viewer"

  c2c_backup_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager::issuer"
      - "task_manager:queue_c2c_acc_registration:consumer"
      - "task_manager:queue_c2c_protection:consumer"
      - "task_manager:queue_c2c_upgrade:consumer"
      - "task_manager::trusted_viewer"
      - "scheduler::admin"
      - "vault_manager::admin"
      - "policy_manager::admin"
      - "tenant_viewer"
      - "credentials_store::owner"
      - "credentials_store::consumer"

  website_backup_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager::issuer"
      - "task_manager:queue_website_protection:consumer"
      - "task_manager::trusted_viewer"
      - "scheduler::admin"
      - "vault_manager::admin"
      - "tenant_viewer"

  simple_backup_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager::issuer"
      - "scheduler::admin"
      - "vault_manager::admin"
      - "tenant_viewer"

  protection_status_service:
    implied_access_policies_for_registered_entity:
      - "policy_manager::admin"
      - "resource_manager::admin"
      - "alert_manager::admin"
      - "tenant_viewer"

  vault_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager::issuer"
      - "task_manager:vm_decommission:consumer"
      - "scheduler::admin"
      - "tenant_viewer"
    roles:
      admin: []

  index_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager:queue_catalog_indexer_tasks:issuer"
      - "task_manager:queue_catalog_indexer_tasks:viewer"
      - "task_manager:queue_catalog_indexer_hpriority_tasks:issuer"
      - "task_manager:queue_catalog_indexer_hpriority_tasks:viewer"
      - "task_manager:queue_catalog_index_tasks:consumer"
      - "task_manager:queue_catalog_decommission_tasks:consumer"
      - "vault_manager::admin"
      - "index_manager_agent::admin"
      - "tenant_viewer"

  index_manager_agent:
    implied_access_policies_for_registered_entity:
      - index_manager::registration
      - "tenant_viewer"

  catalog_manager:
    implied_access_policies_for_registered_entity:
      - "task_manager:queue_catalog_browser_tasks:issuer"
      - "catalog_browser::admin"
      - "tenant_viewer"
    roles:
      admin: []

  catalog_browser:
    implied_access_policies_for_registered_entity:
      - "task_manager:queue_catalog_browser_tasks:consumer"
      - "catalog_manager::admin"
      - "index_manager::index_operator"
      - "tenant_viewer"

  catalog_indexer:
    implied_access_policies_for_registered_entity:
      - "task_manager:queue_catalog_indexer_tasks:consumer"
      - "task_manager:queue_catalog_indexer_hpriority_tasks:consumer"
      - "credentials_store::consumer"
      - "storage::readwrite"
      - "tenant_viewer"
      - "index_manager::index_operator"
      - "index_manager::task_executor"

  alert_manager:
    implied_access_policies_for_registered_entity:
      - "hierarchy_resolver::consumer"
      - "tenant_viewer"
    roles:
      admin: []

  storage:
    implied_access_policies_for_registered_entity:
    roles:
      readonly: []
      readwrite: []
      replication_master: []

  apn:
    roles:
      requestor: []
      node: []

  agent_manager:
    implied_access_policies_for_registered_entity:
      - "agent_manager::admin"
      - "policy_manager::admin"
      - "tenant_viewer"
      - "task_manager:ATP_ResourceDiscovery:issuer"
      - "task_manager:ATP_RemoteInstall:issuer"
      - "task_manager:ATP_CheckCreds:issuer"
      - "task_manager:ATP_RegisterHost:issuer"
      - "apn::requestor"
    roles:
      agent_registrator: []
      agent_registrar: []
      agent_unregistrator: []
      agent_unregistrar: []
      agent_viewer: []
      agent_conn_state_reporter: []
      host_manager: []
      host_uploader: []
      ou_uploader: []
      admin: []

  agent_gateway:
    implied_access_policies_for_registered_entity:
      - "agent_manager::agent_conn_state_reporter"
      - "tenant_viewer"

  stats_server:
    implied_access_policies_for_registered_entity:
      - "vault_manager::admin"
      - "tenant_viewer"

  am_eventproc_service:
    implied_access_policies_for_registered_entity:
      - "task_manager::viewer"
      - "vault_manager::admin"
      - "resource_manager::admin"
      - "policy_manager::admin"
      - "alert_manager::admin"
      - "tenant_viewer"

  am_playbook_service:
    implied_access_policies_for_registered_entity:
      - "agent_manager::host_manager"
      - "task_manager::viewer"
      - "vault_manager::admin"
      - "resource_manager::admin"
      - "policy_manager::admin"
      - "alert_manager::admin"
      - "task_manager:ATP_FixNowMicrosoft:issuer"
      - "task_manager:ATP_FixNowThirdParty:issuer"
      - "agent_manager::agent_viewer"
      - "tenant_viewer"
      - "scan_service::viewer"
      - "apn::requestor"

  atp_grpm_addon:
    implied_access_policies_for_registered_entity:
      - "scan_service::admin"
      - "policy_manager::admin"
      - "vault_manager::admin"
      - "tenant_viewer"

  alerts_feed_manager:
    implied_access_policies_for_registered_entity:
      - "resource_manager::admin"
      - "policy_manager::admin"
      - "alert_manager::admin"
      - "task_manager::issuer"
      - "tenant_viewer"

  scan_service:
    implied_access_policies_for_registered_entity:
      - "task_manager::admin"
      - "vault_manager::admin"
      - "hierarchy_resolver::consumer"
      - "tenant_viewer"
      - "ams::admin"
    roles:
      agent: []
      admin: []
      viewer: []

  monitoring:
    implied_access_policies_for_registered_entity:
    roles:
      provider: []
      viewer: []
      admin: []

  api_gateway:
    implied_access_policies_for_registered_entity:
      - "tenant_viewer"

  files_protect_service:
    implied_access_policies_for_registered_entity:
      - "notary::user"
      - "tenant_viewer"

  storage_migration:
    implied_access_policies_for_registered_entity:
    roles:
      root: []
      admin: []

  platform_storagemgr:
    implied_access_policies_for_registered_entity:
      - "storage::readwrite"
      - "tenant_viewer"
    roles:
      storage_addr_requester: []
      client_crt_requester: []

  agent_resources:
    roles:
      read: []

  cyber_scripting_executor:
    roles:
      admin: []

  atp_agent:
    roles:
      admin: []
      operation: []
      av_scanner: []
      component_manager: []
      notifier: []
      policy_manager: []
      policy_reader: []
      remote_desktop: []
      remote_assistance: []
      scheduled_notification: []
      vapm_info: []

  atp_scan_agent:
    roles:
      admin: []

  atp_downloader:
    roles:
      admin: []
      configurator: []
      readonly: []

  update_controller:
    roles:
      admin: []
      notifier: []
      readonly: []

  mi_monitoring:
    roles:
      admin: []
      model_manager: []
      scheduler: []

  sh_inventory:
    roles:
      admin: []
      hwi_scanner: []
      swi_scanner: []
      hwi_viewer: []
      swi_viewer: []

# possible agents that may be registered (installed) which also need their own Access Tokens
clients:
  agent_core:
    implied_access_policies_for_registered_entity:
      - "agent_manager::agent_registrator"
      - "agent_manager::agent_registrar"
      - "agent_manager::agent_unregistrator"
      - "agent_manager::agent_unregistrar"
      - "agent_manager::agent_viewer"
      - "agent_manager::unit_configuration_viewer"
      - "oauth2_client_admin(backup_agent)" # hack for 9.0 summit, to be removed when proper registration token -> jwt exchange is implemented https://pmc.acronis.com/browse/PLTFRM-14881
      - "apn::node"
      - "agent_resources::read"
    allowed_registrators: [ oauth2_client_admin ]

  computer_backup_agent:
    public_client_id: cf55edc2-02c0-11e8-ba89-0ed5f89f718b # backup agent installer for ABC 7.7
    implied_access_policies_for_registered_entity:
      - "task_manager::consumer"
      - "credentials_store::consumer"
      - "storage::readwrite"
      - "policy_manager::admin"
      - "resource_manager::admin"
      - "task_manager:queue1:consumer"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of backup agent in backup management services

  mms: # role for mms unit of agent_core
    implied_access_policies_for_registered_entity:
      - "credentials_store::consumer"
      - "credentials_store::owner"
      - "policy_manager::admin"
      - "resource_manager::admin"
      - "storage::readwrite"
      - "task_manager::consumer"
      - "tenant_viewer"
      - "platform_storagemgr::storage_addr_requester"
      - "platform_storagemgr::client_crt_requester"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of backup agent in backup management services
    respect_barriers: true

  backup_storage_engine:
    public_client_id: cf55fae2-02c0-11e8-ba89-0ed5f89f718b
    implied_access_policies_for_registered_entity:
      - backup_storage_engine
    allowed_registrators: [ oauth2_client_admin(backup_storage) ] # Registration / deregistration of storage engine in backup management services

  vpn-appliance:
    public_client_id: cf55fd62-02c0-11e8-ba89-0ed5f89f718b
    implied_access_policies_for_registered_entity:
      - "!company_admin"
      - "task_manager:dr-vpn-service:consumer"
      - "dr_service::vpn_appliance"
    allowed_registrators: [ oauth2_client_admin(dr) ] # Registration / deregistration of vpn appliance (running on customer side) to enable connectivity with customer primary / recovery servers (running on Acronis cloud side)

  vpn-server:
    public_client_id: cf560398-02c0-11e8-ba89-0ed5f89f718b # dr deployment system
    implied_access_policies_for_registered_entity:
      - "!company_admin"
      - "task_manager:dr-vpn-service:consumer"
      - "dr_service::vpn_server"
    allowed_registrators: [ oauth2_client_admin(dr) ] # Registration / deregistration of vpn server (server side for vpn appliance)

  dr_backup_agent:
    implied_access_policies_for_registered_entity:
      - "task_manager:dr_backup_queue:consumer"
      - "task_manager:cleanup:consumer"
      - "storage::readwrite"
    allowed_registrators: [ oauth2_client_admin(dr_infra_admin) ]

  run_vm_agent:
    implied_access_policies_for_registered_entity:
      - "task_manager:runvm_delta_create:consumer"
      - "task_manager:runvm_delta_delete:consumer"
      - "task_manager:runvm_gateway:consumer"
      - "task_manager:runvm_vm_create:consumer"
      - "task_manager:runvm_vm_delete:consumer"
      - "task_manager:runvm_vm_finalize:consumer"
      - "task_manager:dr_backup_queue:consumer"
      - "task_manager:cleanup:consumer"
      - "credentials_store::consumer"
      - "vault_manager::admin"
      - "storage::readwrite"
      - "agent_resources::read"
    allowed_registrators: [ oauth2_client_admin(dr_infra_admin) ] # Registration / deregistration of run vm agent on Acronis cloud side

  run_vm_controller:
    implied_access_policies_for_registered_entity:
      - "credentials_store::consumer"
      - "storage::readonly"
    allowed_registrators: [ oauth2_client_admin(dr_infra_admin) ]

  run_vm_gateway:
    allowed_registrators: [ oauth2_client_admin(dr_infra_admin) ]

  atp-agent:
    implied_access_policies_for_registered_entity:
      - "task_manager:ATP_*:consumer"
      - "task_manager:ATP_*:issuer"
      - "task_manager:SHI_VA:issuer"
      - "task_manager:x#ATP_*:consumer"
      - "task_manager::trusted_viewer"
      - "task_manager:cti.a.p.tm.queue.v1.0~a.swd.deploy.v1.0:consumer"
      - "task_manager:cti.a.p.tm.queue.v1.0~a.swd.deploy.v1.0:issuer"
      - "agent_manager::host_uploader"
      - "agent_manager::ou_uploader"
      - "monitoring::provider"
      - "scan_service::agent"
      - "storage::readwrite"
      - "policy_manager::admin"
      - "vault_manager::admin"
      - "tenant_viewer"
      - "credentials_store::consumer"
      - "resource_manager::admin"
      - "agent_resources::read"
      - "atp_downloader::admin"
      - "sh_inventory::admin"
      - "sh_inventory::swi_scanner"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of atp agent on Acronis cloud side

  atp-downloader:
    implied_access_policies_for_registered_entity:
      - "atp_downloader::admin"
      - "atp_agent::vapm_info"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of atp downloader

  sync-unit:
    implied_access_policies_for_registered_entity:
      - "policy_manager::admin"
      - "scheduler::admin"
      - "agent_resources::read"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of sync unit on Acronis cloud side

#  ap_security_agent

  backupAgent: # legacy
    implied_access_policies_for_registered_entity:
      - "task_manager::consumer"
      - "storage::readwrite"
      - "policy_manager::admin"
      - "resource_manager::admin"
      - "agent_manager::agent_registrar"
      - "oauth2_client_admin(backup_agent)"
      - "tenant_viewer"
      - "task_manager:queue1:consumer"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of backup agent in backup management services
    respect_barriers: true

  active_protection:
    implied_access_policies_for_registered_entity:
      - "alert_manager::admin"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of active_protection on Acronis cloud side

  cgw:
    implied_access_policies_for_registered_entity:
      - "frs::admin"
      - "corp-wl::admin"
      - "bitdefender-cleanset::admin"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of cgw on Acronis cloud side

  cyber-protect-service:
    implied_access_policies_for_registered_entity:
      - "frs::admin"
      - "corp-wl::admin"
      - "bitdefender-cleanset::admin"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of cyber-protect-service on Acronis cloud side

  task-manager:
    implied_access_policies_for_registered_entity:
      - "task_manager::delegate"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ]

  storageNode: # legacy
    implied_access_policies_for_registered_entity:
      - "credentials_store::consumer"
      - "credentials_store::owner"
      - "storage::readwrite"
      - "tenant_viewer"
    allowed_registrators: [ oauth2_client_admin(backup_storage) ]

  catalog-browser: # local catalog-browser unit
    implied_access_policies_for_registered_entity:
      - "task_manager:queue_catalog_browser_tasks:consumer"
      - "catalog_manager::admin"
      - "index_manager::index_operator"
      - "tenant_viewer"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # local catalog-browser unit

  credentials-store: # agent-side credentials store unit
    allowed_registrators: [ oauth2_client_admin(backup_agent) ]

  scheduler-unit:
    implied_access_policies_for_registered_entity:
      - "atp_agent::scheduled_notification"
      - "mi_monitoring::scheduler"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of scheduler

  tray-monitor:
    implied_access_policies_for_registered_entity:
      - "task_manager::viewer"
      - "agent_resources::read"
    allowed_registrators: [ oauth2_client_admin(backup_agent) ] # Registration / deregistration of tray-monitor

  superset:
    allowed_registrators: [ services_registrar ]

  device-sense:
    implied_access_policies_for_registered_entity:
      - "task_manager:cti.a.p.tm.queue.v1.0~a.device_sense.queue_scan.*:consumer"
      - "task_manager:cti.a.p.tm.queue.v1.0~a.device_sense.queue_scan.*:viewer"
      - "task_manager:cti.a.p.tm.queue.v1.0~a.device_sense.queue_filter.*:consumer"
      - "task_manager:cti.a.p.tm.queue.v1.0~a.device_sense.queue_filter.*:viewer"
    allowed_registrators: [ oauth2_client_admin(backup_agent), oauth2_client_admin(self) ]

  mi-monitoring:
    implied_access_policies_for_registered_entity:
      - "task_manager::trusted_viewer"
      - "task_manager:MI_*:consumer"
      - "task_manager:MI_*:issuer"
      - "task_manager:CSE_*:issuer"
      - "alert_manager::admin"
      - "atp_agent::policy_reader"
      - "cyber_scripting_executor::admin"
      - "policy_management::read"
      - "agent_resources::read"
    allowed_registrators: [ oauth2_client_admin(backup_agent), oauth2_client_admin(self) ]

  update-controller:
    implied_access_policies_for_registered_entity:
      - "task_manager:x#UpdateFeatureSet:issuer"
      - "task_manager:x#UpdateFeatureSet:consumer"
      - "task_manager:x#UpdateAgent:consumer"
      - "task_manager:x#ATP_RemoteInstall:consumer"
      - "task_manager:x#ATP_RegisterHost:consumer"
      - "task_manager:ATP_CheckCreds:consumer"
      - "task_manager::trusted_viewer"
      - "agent_resources::read"
    allowed_registrators: [ oauth2_client_admin(backup_agent), oauth2_client_admin(self) ]

  sh-inventory: # software and hardware inventory unit
    implied_access_policies_for_registered_entity:
      - "task_manager:SHI_*:consumer"
      - "task_manager::viewer"
      - "resource_manager::admin"
      - "monitoring::provider"
      - "agent_resources::read"
      - "atp_agent::notifier"
    allowed_registrators: [ oauth2_client_admin(backup_agent), oauth2_client_admin(self) ]

© 2025 Cubjrnet7