For this you can utilize the dedicated accounts mapping option for local privileged accounts.
For this you need below things:
- Dedicated local privileged accounts. ex. Amila_admin
- User accounts: Amila
Create a dedicated account mapping smart rule, to map _admin prefix with the users group.
Then the user will only able to see their own dedicated accounts.
Here is a kb article regarding setup:
How to setup dedicated accounts
@RahulB @GloriaB
Can this dedicated accounts works for firewall accounts ? Each user has their own firewall local account.
Yes it will work, as long as you have dedicated accounts, but make sure that in the privileged accounts there is a prefix or postfix so that the dedicated mapping can work with the users group.
When setting these up, spelling is everything. We have accounts and privileged accounts. I had a few users where their primary account was something like msmith for Mike Smith and an elevated account of msmit.priv. I was mapping on .priv so msmith does not match msmit
I had these handful of anomalies renamed to include the full spelling of the primary account. (added the h to smit in the privileged account).