What's on this page

Default LM Users

The default installation of Stratoss™ Lifecycle Manager comes with the following default users, groups, roles and privileges.

Default users

Username Password Member of Group Suspended
Jack jack SLMAdmin No
Jill jill Portal No
John john SLMAdmin No
Jane jane SLMAdmin, RootSecAdmin No
Derek derek RootSecAdmin No
Lisa lisa - No
Kim kim ReadOnly No
Steve steve SLMAdmin Yes

Default groups

Group Name Roles Granted
SLMAdmin SLMAdmin
Portal Portal
RootSecAdmin RootSecAdmin
ReadOnly ReadOnly

Default roles

SLM Role Description Privileges
SLM Admin A user with the ‘SLMAdmin’ role can perform the whole range of operations permissible with Stratoss LM
  • Network Service instances - CRUD
  • VNF Instances - CRUD
  • Network Service Designs - CRUD
  • VNF Designs - CRUD
  • Deployment Locations - CRUD
  • VDUs - CRUD
  • Behaviour Tests - CRUD
Portal As a user with ‘Portal’ role can create Assembly Instances, but otherwise has read-only access
  • Network Service instances - CRUD
  • VNF Instances - Read-Only
  • Network Service Designs - Read-Only
  • VNF Designs - NO ACCESS
  • Deployment Locations - Read-Only
  • VDUs - NO ACCESS
  • Behaviour Tests - NO ACCESS
ReadOnly As a user with ‘ReadOnly’ role has read-only access to all parts of the system
  • Network Service instances - Read-Only
  • VNF Instances - Read-Only
  • Network Service Designs - Read-Only
  • VNF Designs - Read-Only
  • Deployment Locations - Read-Only
  • VDUs - Read-Only
  • Behaviour Tests - Read-Only
RootSecAdmin ‘Root Security Admin’. Only an authenticated LM user with this role can create/update/delete role definitions within Stratoss LM and carry out other security admin tasks.
A user with only this role cannot perform any other operations within Stratoss LM.
  • User Credentials - CRUD

Available privileges

The list of available privileges which can be listed against a role to assign permissions are as follows:

Category Description Privilege Available actions
Security Administration Administer the security of the system, i.e. viewing or modifying credentials SECADMIN
  • execute
  • write
  • read
Intent request operations Perform intents relating to health operations on an assembly, i.e. scale or heal INTENTREQSOPS
  • execute
Intent request management Perform intents relating to management of assemblies, e.g. create, delete or upgrade INTENTREQSLMGT
  • execute
Network service instance management Perform operations reliant on creating or viewing network service isntances NSINSTSMG
  • write
  • read
Network service design Create and view descriptors for network services NSDESMGT
  • write
  • read
SLM Administration Manage deployment locations, resource managers and UI themes SLMADMIN
  • write
  • read
Manage Deployment Locations Create and view deployment locations DEPLOYLOCMGT
  • write
  • read
Behaviour Scenario Execute Execute behaviour scenarios and view execution results BEHVRSCENEXEC
  • execute
  • write
  • read
Behaviour Scenario Design Design behaviour scenarios BEHVRSCENDES
  • write
  • read