18. One Identity Permissions

2 апреля 2020 г.

14:54

Чтобы Employee мог на портале видеть и редактировать кастомную таблицу надо

1) В Manager в OneIM Manager – Base Role создать Application role с Perm Group = CCCEditRole

2) Поместить Employee в эту App Role

Не работает для сотрудника, к которому привязана административная системна уз 1IM


Отображение кастомных атрибутов на портале

We need to ensure that any schema extensions get assigned access permissions.

If you have a schema extension attribute, on Person say, and there are not permissions set then you will see this text: \<hidden:XXXX>

Requête Attestation Conformité Responsabilités Appels @Données principales - Abdo, Antoine (ANTOINE.A Date de naissance Numéro personnel Genre Compte d'utilisateur central Adresse e-mail par défaut 0 - Inconnu ANTOINEABDO [redacted-email] Informations de l'organisation Centre de coûts principal Département principal Employment Code (non attribué) Marketing <hidden: Employment Code* Û Externe Attribuer Modifier

Permission groups are created at Install time to help with this:

CCCEditPermissions, CCCViewPermisions, CCCEditRole and CCCViewRole.

We just need to ensure that the standard permission groups inherit these new permissions. This is done in Designer->Permissions:

Qatabase permissions groups users Options Help a Commit to database e Back • + Next • • Search Navigation Permissions System user Permissions grot»s Permissions groups Role based permissionsgroups Disabled permissionsgroups By tables Program functions Getting Started One Identity Manager Schema O Permissions process Orchestration Script Library User Interface Mail Templates Documentation Base Data Favorites itor Base Data List Editor I ShoppingCartltem Schema Editor PersonWantsOrg Inheritance Direction Tasks O Permissions inform2ion Edit permissbrz User & perm Gro. O Show/ edit permissions VI 4 ALLMANAGER VI-4_ALWSER 4 LUSER LOOKU NADMIN_AOMIN IVj-4-AUDITl UDITCR No object selected Everyone (Change) This is Make the OOTB permissions inherit from the default permissions for custom schema attributes. O CCCEditRole CCCVieWROl€ These permissions grups are used in the default application roles to grant permissions.

Optional: Just verify the permission of the CCC*Permission roles:

Qatabase permissions Commit to database Navigation rrmsslons System user Permissions g Simulation options Yiew Help Next' Back Search X ns Group Editor Designer - viadmin@demoapp1\D11M7 (Main Database) 1 Permissions group CCCViewRole Permissions Permissions Editor Permissi,„ - CCC Haircolor. x VI 4 ALLUSER Simulati„. I W CCCEditROle I X CCCViev,R01e List Editor Permissions groups Role based permissions groups Disabled permissionsgroups a Program functions Getting Started One Identity Manager Schema Permissions Process Orchestration Table Person ApprovalState AuthentifierLogins BirthDate Building CanonicalName ccc_Eyecolor ccc_HairC010r CentralAccount Centralpassword City Summary of all permissions for Person Permissions CCCEditPermissions CCCEditRole CCCViewPermissions CCCViewRole CCCVieWR01e1 Permission group being reviewed Permissions on the table and columns. Note: this does not show inherited View Edit Insert Viewing condition permissions. Insert condition Edit condition All Permissions on the Person table -rasks O Column overvie•.' Schema Ednor Show column definition Show column Person - ccc_Haircolorjn schema Permissions Edi... Edit p emissions for column 'Person- CCC HairCoIor' Language Edit translation column 'Person - CCC HairColor'

And now, alles gut. To avoid seeing a cached value of the web pages, you should:

  • Delete all the Cache directories in the Web Portal IIS AppData folder

  • iisreset

  • Login again to the portal