Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Access Authorization and Permissions

Page Properties
hiddentrue
idDONE

Product Version
Report Note
Assignee

Resources & Remarks

Modification History

NameDateProduct VersionAction
Antje08 FEB 20212.4New page properties macro.
Antje23 FEB 20212020 WinterReplace content.


...

Excerpt

A yuuvis® Momentum user might be not authorized to use the full functionality of the system. Permissions can be set for users to allow or prohibit actions on objects of various types or the usage of specific endpoints.


Section
bordertrue


Column

Table of Contents

Table of Contents
exclude(Table of Contents|Read on|Assigning Roles to Users|Permissions via Roles|Access Authorization for Endpoints|Another interesting Tutorial|Ressources|Remarks)


Permission System via Roles

The Core API protects documents against access by unauthorized persons through a permission system. Each user has one or more roles in this system, giving them access to various documents for specified actions. The user-role-mapping is managed separately.

>> Permissions via Roles

User-Role-Mapping

The user-role-mapping manages the assignment of roles to users. In yuuvis® Momentum, this mapping is managed separately from the authentication process itself and can be configured according to the customers' needs. Per default, the ORGANIZATION service is used, which can either read the information from a configuration file ("trusted") or request the information from the identity provider Keycloak.

>> Assigning Roles to Users

Define Permissions for Endpoints

The yuuvis® authentication service decides for each API request of any user if the access is granted or not. In its configuration, the access conditions can be defined individually for each API endpoint. Thus, permissions in yuuvis® Momentum can be set not only for types of actions and the usage of specific object types, but also directly for API endpoints. It is even possible to allow the usage of an API endpoint for callers without authentication.

>> Access Authorization for Endpoints

Info
iconfalse

Read on

Section


Column
width25%

Permissions via Roles

Insert excerpt
Permissions via Roles
Permissions via Roles
nopaneltrue
 Keep reading


Column
width25%

Assigning Roles to Users

Insert excerpt
Assigning Roles to Users
Assigning Roles to Users
nopaneltrue
 Keep reading


Column
width25%

Access Authorization for Endpoints

Insert excerpt
Access Authorization for Endpoints
Access Authorization for Endpoints
nopaneltrue
 Keep reading




...