ערוך

שתף באמצעות


Prerequisites for Wi-Fi and VPN profiles in Configuration Manager

Applies to: Configuration Manager (current branch)

Important

Starting in version 2203, this company resource access feature is no longer supported. For more information, see Frequently asked questions about resource access deprecation.

Wi-Fi and VPN profiles in Configuration Manager have dependencies only within the product.

You need the following security permissions to manage company resource access settings, such as certificate profiles, Wi-Fi profiles, and VPN profiles:

  • To view and manage alerts and reports for Wi-Fi and profiles: Create, Delete, Modify, Modify Report, Read, and Run Report for the Alerts object.

  • To create and manage certificate profiles: Author Policy, Modify Report, Read, and Run Report for the Certificate Profile object.

  • To manage Wi-Fi, certificate, and VPN profile deployments: Deploy Configuration Policies, Modify Client Status Alert, Read, and Read Resource for the Collection object.

  • To manage all configuration policies: Create, Delete, Modify, Read, and Set Security Scope for the Configuration Policy object.

  • To run queries that are related to Wi-Fi and VPN profiles: Read permission for the Query object.

  • To view Wi-Fi and VPN profiles information in the Configuration Manager console: Read permission for the Site object.

  • To view status messages for Wi-Fi and VPN profiles: Read permission for the Status Messages object.

  • To create and modify the Trusted CA certificate profile: Author Policy, Modify Report, Read, and Run Report for the Trusted CA Certificate Profile object.

  • To create and manage VPN profiles: Author Policy, Modify Report, Read, and Run Report for the VPN Profile object.

  • To create and manage Wi-Fi profiles: Author Policy, Modify Report, Read, and Run Report for the Wi-Fi Profile object.

The Company Resource Access Manager built-in security role includes these permissions that are required to manage Wi-Fi profiles in Configuration Manager. For more information, see Configure security.