Connectivity Solutions

Additional Products

Dedicated Compute, On Demand
Dedicated Compute, On Demand
Spin up Latitude.sh CPUs and GPUs in key markets, then use Megaport private connectivity to reach clouds and data centers across 1,000+ locations with predictable performance.
Explore Compute

Explore

Build

Join the Megaport Community
Join the Megaport Community
The community for network engineers, IT leaders, and partners to swap ideas and build what’s next.
Join Community

Get in touch

Corporate Info

Partners

It's official: Megaport x Latitude.sh
It's official: Megaport x Latitude.sh
Latitude.sh dedicated compute meets Megaport private connectivity so you can launch fast and run anywhere.
Press Start

Portal Highlight: Service Groups

A common complaint we hear about regarding supplier web portals is that if a single person needs access to multiple companies, that person generally needs to maintain multiple accounts.

One of the core concepts in the Megaportal is the idea that all our services belong to a Service Group. A Service Group is owned by a company and permissions are granted against the Service Group. Services can belong to multiple service groups, and people or roles can be assigned access to multiple service groups. Permissions can be granted to people or roles, we’ll get to this in a moment.

Users & Roles

Users are employed by one or more companies and all users have a Role or Position assigned to them. This might be a job title, department or term that is significant to you and your company. Users can be granted permissions directly on a Service Group. You can take a more powerful approach though and assign a Role permissions on a Service Group. This way you can give your NOC team permission to view and modify services, and any new NOC staff that are added later automatically inherit the permission.

Service Agents

Implementing Service Agents is another concept that we feel is important in the Megaportal. Service Agents are users that can be “invited” to another company. For example, a customer can invite a third party contractor and grant the contractor select permissions to act on their behalf.

Take this example:

Service inheritance

This company has separated their services under two Service Groups and added users to the groups they need access to. They also outsource some work to external companies who also need limited access to some of the services. The example above illustrates how these links work. A consultant from External Company A is assigned a position from the company which grants them any permissions inherited from that role. A consultant from External Company B has been added to Service Group 2 individually so the permissions applied to that user can be fine-tuned. It’s a simple example but the system is designed in such a way that it allows complex configurations.

Conclusion

We’re always looking for ways to improve and simplify the customer experience. If you have any ideas on things we can do to make the portal or the phone apps better, please make sure to let us know.

Related Posts

Why Exetel Automated Their Cloud Connectivity

Why Exetel Automated Their Cloud Connectivity

Automating and orchestrating your cloud connections can transform not only your customer’s journey, but your own as well.

Read More
Partner Spotlight: DC Blox

Partner Spotlight: DC Blox

DC BLOX partners with Megaport to deliver secure, low-latency connectivity to leading cloud providers like AWS and Microsoft Azure. With Megaport’s Software Defined Network, DC BLOX customers in the Southeast gain access to hybrid cloud environments, global connectivity, and seamless cloud transitions from any DC BLOX data center. Explore scalable solutions for your digital business.

Read More
Maximizing Peering Through Flow Analysis

Maximizing Peering Through Flow Analysis

Discover how to use flow data to pinpoint your most valuable traffic, identify missing peer opportunities, and make smarter peering choices across your internet exchanges.

Read More