...
CoreOne Suite Security Role | Access | Desciption |
---|---|---|
CoreOne Suite Administrator | Full Access | Gives full access to the whole system |
CoreOne Suite Approvals | Access to approval requests where the assignee is involved | Assign this role to users that need to take part in an approval process. |
CoreOne Suite Service Desk | Access to basic Identity Management and Management Features | Can be used to give Service Desk employees basic rights such as see seeing all employees, reset passwords and so on. |
CoreOne Suite Self-Service User | Access to the Self-Service Portal Access to his own Core Identity Access to his own Identities Access to orderings and approvals | Gives users basic rights to perform thins actions like resetting the password reset for his own accounts , or ordering a role or approving an order where the user was configured to be an approverfor himself |
When licenceslicenced, the Advanced “Advanced Permission Management Management” Module allows you to create your own Security Roles. When doing so, you can configure the view permissions and the data access permission within the CoreOne Suite Admin UI can be configured by yourself.
View Permissions
The view permissions follow a basic naming concept which should indicate what they represent in the UI.
Data Access Permission
Data Access Permission are stored as sets of entity permission. Each such permission consists of three things. The entity where access is given to, the security mode and a filter.
...
An entity is any object within the CoreOne Suite Meta Directory from . From a Core Identity , to a Target System Configuration, everything is stored in an entity and can therefore be selected. All available entities are presented to you in the UI and they follow the same logic naming as all the UI masks do.
...
If you do not set a filter, the chosen security mode is applied to all entities. If you set one, you can further filter the entities to which the current permission will apply to. To do so, there are a couple of filter filters available. If you apply them, the data will be filtered according to the filter configuration.
...