Skip to main content
Version: On prem: 15.0.2

Authorization roles

An authorization role is a role that defines the user or user groups permission to access and/or work with authorization elements or objects defined in the application.

You can assign users or user groups to an authorization role that specifies permissions for any number of authorization elements. The most common permissions are Create, Read, Update, and Delete.

The permissions can vary, depending on the nature of the authorization role element. The authorization elements relate to the master data of the system.

You can set authorization roles for each type of master data to control individual users or user groups to work with that particular type of master data represented through authorization elements.

Go to Setup > Administration > Users & Security > Authorization Roles. Click New in the upper-left corner to create an authorization role.

Edit an authorization role

  1. Go to Setup > Administration > Users & Security > Authorization Roles

  2. Click the authorization role, or open the context menu and then select Edit.

  3. Type a name for the new authorization role and choose a user or a user group to whom the authorization role should belong.

Create an authorization role

The authorization role dialog box is the same for creating and editing authorization roles.

  1. Click New in the toolbar.

  2. Fill in the Name, Description , Users and User groups fields.

  3. Click Apply: this enables the button Authorizations in the toolbar.

  4. Select the relevant permissions for the role.

  5. Click OK to save your changes.

Set authorization on the menu

You can see or set specific authorizations for views in the Menu structure page in Omada Identity. You can add one or more authorization roles for a view. To do so, go to Setup > Administration > User Interface > Menu Structure.

info

Even in cases in which you do not have access to a menu item, you can still open the web page manually if you have the URL. This is not the case with views. See the following example for more information.

Security summary

The Security Summary shows the rights of a user or a user group and the roles to which the user or user groups belongs. You can access the security summary via the Users or User Groups. Click the relevant user or user groups, then click the Security Summary button.

The Security Summary may look similar to the Authorization dialog box when you see it at first glance, but you cannot edit anything here. The page serves as an overview of the rights and roles to which the role belongs. The sum of all the user/user group's authorization roles is listed at the bottom of the dialog box under Permissions for Special Objects. This summary is based on the authorization roles to which the role belongs. Permissions for special objects lists this role's right to create/read/update/delete users, user groups, and process templates according to Data Object Security Model (DOSM).

Security in views

You should restrict access to views as well as to property lookup views, based on a user's group membership. It may be a good idea to restrict a common user's access to only have access to those sections that relate to their resource assignments or jobs.

Example

Here you will find an example of a security view.

Here you will find an example of a** property lookup view**.

Each type of user can see different views in the left-side menu, depending on the permissions they have been granted. The number of views and functionality available in the left-side menu varies between the basic user, the business manager, and the system administrator. For examples for each type of user, see the following images.

Basic user access

Under the My Data area, the basic user only has access to the basic fundamentals. The basic user does not have access to any administrative views, only tasks related to the basic user themselves.

basicuser

Access for managers

The manager has access to more views and functionality than the basic user. In addition to the basic user's access, the manager can, for example, manage identities and contractors and view reports.

Accessmanager

Access for system administrators

The system administrator has access to all system-related views and functionality in Omada Identity.

systemadm

The system administrator also has the third area available that is not available to basic users nor managers which is the Setup tab.

systemadmin

Under the Setup tab, the the system administrator can set up all functionalities related to the system setup, for example, system onboarding or changing or adding resources.

All of this functionalities are not available to a basic user or manager in a typical setup, because a change in the configuration can have impact on the system performance. Only advanced system users should do make any changes to configuration.

info
  • Even in cases in which you do not have access to a menu item, you can still open the web page manually if you have the URL. With reference property views it is possible to retrieve the list of possible values using web service calls.

  • The access limitation to views is customized per user or user groups with the attribute Visible to.

  • You cannot open a view that you do not have access permissions for.

Predefined authorization roles

Omada Identity comes with a predefined set of authorization roles and each role has default authorizations. This section covers each role and the authorizations that it has by default. However, you can modify these authorizations. If you want to know how to modify them, go to section Edit an authorization role.

Resource owner

Resource owner is linked to Resource owners user group.

Authorization elementCreateReadUpdateDelete
ODataXXXX

Administrator role

Administrator role is linked to System administrators user group.

Authorization elementCreateReadUpdateDeleteExecute
Application stringsXXXX
Authorization rolesXXXX
Browser event handlersXXXX
Code assembliesXXXX
Code method configurationsXXXX
Copy rulesXXXX
Data objects countersXXXX
Data exchange configurationsXXXX
Data object typesXXXX
Event definitionsXXXX
FormsXXXX
Mail templatesXXXX
Menu itemsXXXX
ODataXXXX
PropertiesXXXX
Password filter webserviceXXXXX
Password reset access modifierXXXXX
SequencesXXXX
StylesheetXXXX
TimersXXXX
ViewsXXXX
Web page help contextXXXX
Work weeksXXXX
Queue identity for recalculationX

Service desk role

Service desk role is linked to Service desk agent user group.

Authorization elementCreateReadUpdateDeleteExecute
ODataXXXX
Queue identity for recalculationX
Authorization elementRequest accessRequest access statusRevoke assignmentsReassign Activities
Service deskXXX
Authorization elementReadRead and Update
Activity access modifierX
Process access modifierX
Resource assignments access modifierX
Authorization elementReset all passwordsReset managed identities passwords
Password reset access modifierX

Auditor role

Auditor role is linked to Auditors user group.

Authorization elementCreateReadUpdateDelete
Application stringsX
Authorization rolesX
Browser event handlersX
Code assembliesX
Code method configurationsX
Copy rulesX
Data object countersX
Data object typesX
Data exchange configurationsX
Event definitionsX
FormsX
Identity access modifierX
Mail templatesX
Menu itemsX
ODataXXXX
PropertiesX
Process target access modifierX
SequencesX
StylesheetsX
TimersX
Views (all)X
Web page help contextsX
Work weeksX

CIAM service user role

CIAM service user role is linked to CIAM service user user group.

Authorization elementCreateReadUpdateDelete
Data object typesX
FormsX
Mail templatesX
Menu itemsX
ODataXXXX
PropertiesX
Views (all)X
Authorization elementReadRead and Update
Identity access modifierX

CIAM end user role

Authorization elementCreateReadUpdateDelete
ODataXXXX

Data administrator role

Data administrator role is linked to Data administrators user group.

Authorization elementCreateReadUpdateDeleteExecute
Application stringsX
Authorization rolesX
Browser event handlersX
Code assembliesX
Code method configurationsX
Copy rulesX
Data exchange configurationsX
Data objects countersX
Data object typesX
Event definitionsX
FormsX
Identity access modifierXX
Mail templatesX
Menu itemsX
ODataXXXX
PropertiesX
SequencesX
StylesheetX
TimersX
ViewsX
Web page help contextX
Work weeksX
Queue identity for recalculationX

Employee role

Employee role is linked to Employees user group.

Authorization elementCreateReadUpdateDelete
ODataXXXX

Manager role

Manager role is linked to Managers user group.

Authorization elementCreateReadUpdateDeleteAllow
ODataXXXX
Authorization elementReset all passwordsReset managed identities passwords
Password reset access modifierX

Operation administration role

Operation administration role is linked to Operation administrators user group.

Authorization elementCreateReadUpdateDeleteAllowExecute
Application stringsX
Authorization rolesX
Browser event handlersX
Code assembliesX
Code method configurationsX
Copy rulesX
Data exchange configurationsX
Data object countersX
Data objects typeX
Event definitionsX
FormsX
Mail templatesX
Menu itemsX
Identity access modifierX
ODataXXXX
PropertiesX
Provisioning errorsXX
SequencesX
StylesheetX
TimersX
ViewsX
Web page help contextsX
Work weeksX
Queue identity for recalculationX
Authorization elementReset all passwordsReset managed identities passwords
Password reset access modifierX

Password filter role

Authorization elementCreateReadUpdateDeleteAllow
Identity access modifierX
Authorization elementExecute PasswordFilter methodExecute PasswordChangeNotify method
Password filter webserviceXX

Platform administrator role

Authorization elementCreateReadUpdateDelete
ODataXXXX

System owner role

System owner role is linked to System owners user group.

Authorization elementCreateReadUpdateDelete
ODataXXXX

Contractor role

Authorization elementCreateReadUpdateDelete
ODataXXXX

User role

System owner role is linked to Everyone and System administrators user group.

User role does not have any permissions regarding authorization elements by default. If you want to modify permissions assigned to User role, go to section Edit an authorization role.