Talend Cloud Management Console - Cloud

Talend Cloud Management Console User Guide

Version
Cloud
Language
English (United States)
Product
Talend Cloud
Module
Talend Management Console
Content
Administration and Monitoring > Managing projects
Administration and Monitoring > Managing users
Deployment > Deploying > Executing Pipelines
Deployment > Deploying > Executing Tasks
Deployment > Scheduling > Scheduling Tasks
Role Permission names and IDs Allowed operations
Security Administrator
  • Users - Manage

    TMC_USER_MANAGEMENT

  • Roles - Manage

    TMC_ROLE_MANAGEMENT

  • Groups - Manage

    TMC_GROUP_MANAGEMENT

  • Subscription - Manage

    TMC_SUBSCRIPTION_MANAGEMENT

  • Password policy - Manage

    TMC_POLICY_PASSWORD

  • SSO - Manage

    TMC_SSO_MANAGEMENT

  • Service Account - Manage

    TMC_SERVICE_ACCOUNT_MANAGEMENT

  • Audit logs - View

    AUDIT_LOGS_VIEW

  • Manage users, roles, and groups
  • Manage service accounts
  • Access subscription information
  • Configure password policies and single sign-on
Project Administrator
  • Projects - Manage

    TMC_PROJECT_MANAGEMENT

  • Artifact repository - Configuration

    TMC_CONFIGURATION_NEXUS_USERLIBS

  • Manage projects (including project authorizations)
  • Set up user libraries in the artifact repository
Environment Administrator
  • Promotion - Manage

    TMC_PIPELINE_MANAGEMENT

  • Environments - Manage

    TMC_ENVIRONMENT_MANAGEMENT

  • Promotion - Start

    TMC_PROMOTION_EXECUTION

  • Manage environments, workspaces, and promotions
  • Execute promotions
Infrastructure Administrator
  • Engines - Manage

    TMC_CLUSTER_MANAGEMENT

  • Static IP - Manage

    TMC_STATIC_IP_MANAGEMENT

  • Export Logs - Manage

    TMC_EXPORT_LOGS_MANAGEMENT

  • Manage Cloud Configurations

    TMC_CLOUD_CONFIGURATION_MANAGEMENT

  • Run Profiles - Manage

    TMC_RUN_PROFILE_MANAGEMENT

  • Create, update, and delete Remote Engine Gen2
  • Manage remote engines and remote engine clusters
  • Configure static IP addresses
  • Export logs
Operator
  • Operations - Manage

    TMC_OPERATOR

  • Run Profiles - Manage

    TMC_RUN_PROFILE_MANAGEMENT

  • Publish Jobs, Routes, and data services from Talend Studio *
  • Publish pipelines from Talend Cloud Pipeline Designer
  • Configure, schedule, execute, and monitor tasks and plans
  • Create, update, and delete pipeline run profiles
  • Configure run profiles for remote engines
Integration Developer
  • Studio - Develop

    STUDIO_ENTITLEMENT_STUDIO_DEVELOPER

Publish from Talend Studio. For more information, see Talend Studio.
Each user with at least one of the following individual permissions consumes a seat in Talend Cloud Management Console:
  • Permissions
    Permission names Permission IDs
    Static IP - Manage TMC_STATIC_IP_MANAGEMENT
    Promotion - Manage TMC_PIPELINE_MANAGEMENT
    Promotion - Start TMC_PROMOTION_EXECUTION
    Operations - Manage TMC_OPERATOR
    Export Logs - Manage TMC_EXPORT_LOGS_MANAGEMENT
    Engines - Manage TMC_CLUSTER_MANAGEMENT
    Environments - Manage TMC_ENVIRONMENT_MANAGEMENT

The individual permission Engines - Use (permission ID is TMC_ENGINE_USE) consumes no seats. This permission allows to view and use the remote engines and the run profiles, and execute tasks. You can assign this permission to any role.

When the Remote Engines are allocated to custom workspaces, associate Engines - Use with the workspace permission Use engines. This workspace permission is the combination of the Execute and View permissions.

By default, the following roles have permissions that consume a seat in Talend Cloud Management Console:
  • Environment Administrator
  • Infrastructure Administrator
  • Operator

Note that if you add permissions from the list above to other roles, these roles will then consume a seat in Talend Cloud Management Console too.

For example, using the default roles, a user who has both the Operator and Environment Administrator roles consumes 1 Talend Cloud Management Console seat. A user who has the Security Administrator role consumes no seat, because the default permissions of this role are not part of the list above.