Control Room overview
The Control Room is the brain of the digital workforce platform. It is a Microsoft Windows server-based web application providing a single administrator interface for Enterprise-wide bot deployment, management, and control.
Control Room provides automated provisioning, orchestration, governance, and actionable analytics for Enterprise-wide implementation.
Why use Control Room?
- Leverage multiple authentication options of Active Directory using LDAP, Active Directory using Kerberos, local authentication using the embedded Credential Vault, and Single Sign-On using Security Assertion Markup Language (SAML) 2.0.
- Ensure the secure digital workforce platform based on granular role-based access control (RBAC) and industrial grade encryption for data at rest and in transit.
- Control remotely running automations centrally.
- Access built-in version control feature for multi-user collaboration.
- Store system-managed credentials and critical system configuration data using secure Credential Vaults.
- Enforce best practices to meet stringent compliance mandates using Bot Lifecycle Management (BLM).
What you must know about access control, management, and monitoring
- Access control
- As an administrator, define custom roles and set permissions for the full suite of Control Room objects and functions, including user management, licensing, Credential Vault, bot schedules, dashboards, and audit logs.
- See Roles overview and User management overview for more information.
- Centralized management
- Meet the demands of dynamic service level agreements (SLAs) using dynamic workload management (WLM) for industrial-scale automation. WLM includes built-in SLA calculators with a human-in-the-loop flexibility to enable prioritization of high-value task queues.
- See Workload overview for more information.
- Monitor using reports
Capture event details for user and entity actions including the creation, modification, enablement, disablement, and removal of users, bots, Bot Creators, and Bot Runners.
Customize automated dashboards and reports to identify and alert you about abnormal activities. Export logs to use other analysis, reporting, and incident investigation/response infrastructure already in use by the organization, for example, Security Information and Event Management (SIEM) and advanced analytics tools.