Skip to content

What is Global Management (Ghippo)?

Global Management (Ghippo) is a comprehensive user-centered service, including access control, enterprise space, audit log, platform configuration and other basic modules.

  • Access control:Help users manage access to resources. Users are allowed to create, manage, and delete users/groups, and flexibly configure user/group permissions to divide users' functional rights.

  • Enterprise space:A resource isolation unit with hierarchical structure and capability of access control. Users are allowed to set hierarchical structure depending on the enterprise development environment, department structure, etc., and control who has access to which resources.

  • Audit log:Provide operation logs of resources, which allows security analysis, resource changes, problem location, etc.

  • Platform configuration:Through platform security policy, mail server, appearance customization, etc., you can ensure secure user information and a personalized platform.

Benefitss

  • All services under one menu

    The basic service modules of the platform are brought together to reduce the troubles caused by menu switching and function scattering. Platform administrators can complete basic settings and user management under one menu.

  • Combination of users and tenants

    Flat management of users and groups as well as hierarchical tenant (workspace) collaboration enable multi-dimensional and multi-scenario access control based on the platform and resource-based function division.

  • Personalization

    Support personalized platform appearance, including custom login page and top navigation bar. Easily configure a unique platform through visual pages.

  • Beginner friendly

    Most of the configuration has been done for users in advance, including password rule, session timeout policy, etc., simplifying user operations and being ready to use.

Operations

  1. Log in to the DCE platform using the DCE platform administrator (Admin) or a user with Admin privileges

  2. Go toAccess control. Create users and authorize, and then create groups and authorize, and eventually create identity provider.

  3. Go toWorkspace. Create hierarchy (enterprise hierarchy relationship), and then create workspace (tenant).

  4. Go toAudit log. View and export audit log.

  5. Go to Platform configuration. Configure security policy, mail server, appearance, and genuine license.

Free Trial Now

Comments