Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
devel:documentation:roles [2019/02/13 08:56] kotisovam [Devel guide] title edit |
devel:documentation:roles [2019/03/20 16:26] poulm remove invalid link |
||
---|---|---|---|
Line 1: | Line 1: | ||
<- .: | <- .: | ||
- | {{tag> role incompatible business automatic SoD Segregation | + | {{tag> role incompatible business automatic SoD Segregation Duties }} |
====== Roles ====== | ====== Roles ====== | ||
- | A role in CzechIdM is an entity representing a set (1 or many) of permissions/ | + | A role in CzechIdM is an entity representing a set (1 or many) of privileges on the end system or in CzechIdM itself |
- | * **automatically** – according to the organizational placement | + | |
- | * **manually** – through assigning based on the user’s request | + | |
- | * **by business role** - roles (sub) can be assigned automatically, when other role (superior) by defined role composition | + | |
- | From the perspective | + | Users acquire roles: |
+ | * [[.roles: | ||
+ | * manually | ||
+ | * [[.roles: | ||
+ | * [[tutorial: | ||
- | ===== Roles and contracts ===== | + | Request for a role [[.role_change|can be approved]] by a specific user, usually helpdesk, user's manager or IT security. |
- | {{ :devel:adm:idm_entities.png? | + | === Business roles === |
+ | Roes can be aggregated into [[.roles:adm:business_roles|business roles]]. Provided role A is a subrole of role B, If role B is assigned (no matter how - automatically or manually) to the user, he acquires also role A. | ||
+ | === Incompatible roles (segregation of duties) === | ||
+ | If an identity should not be placed into Security Group A and Security Group B in MS Active Directory at the same time, we can ensure it via CzechIdM mechanism of [[.roles: | ||
+ | |||
+ | ===== Roles and contracts ===== | ||
Roles are assigned to users via their contracts. If a contract is not valid (time validity) the roles on the contract are removed. In other words, the identity loses roles permissions in IdM and rights in connected systems. | Roles are assigned to users via their contracts. If a contract is not valid (time validity) the roles on the contract are removed. In other words, the identity loses roles permissions in IdM and rights in connected systems. | ||
- | ===== Roles and environment ===== | + | {{ : |
- | Role with the same base code could be created from / for different environment. Final role code is combined from the base code and environment identifier. When role is created (or synchronized), | + | ===== Automatic roles ===== |
- | * '' | + | ==== By org. structure ==== |
- | * '' | + | |
- | * '' | + | |
- | ===== Role permissions===== | ||
- | |||
- | Role permissions define rights for administrator actions in CzechIdM. A permission for CzechIdM is not necessarily defined for every role. A permission is, for example, READ on USERS. A user having a role with this specific permission can see the read-only detail of all identities in CzechIdM. | ||
- | |||
- | {{ : | ||
- | |||
- | ===== Role criticality===== | ||
- | The level of criticality can be set for every role. Criticality denotes, [[devel: | ||
- | |||
- | ===== Business roles ===== | ||
- | Business roles (composition) can be defined on role detail. Business role could contain sub roles - all sub roles are assigned automatically, | ||
- | Sub roles defined by business roles are recalculated on the background (by [[devel: | ||
- | |||
- | {{ : | ||
- | |||
- | {{ : | ||
- | |||
- | ===== Incompatible roles ===== | ||
- | **Segregation of Duties** (SoD) can be ensured by incompatible roles. Their setup resembles that of business roles, described above. | ||
- | |||
- | {{ : | ||
- | |||
- | The old generation CzechIdM used to have a feature of [[https:// | ||
- | |||
- | When an incompatible role has been assigned to an identity, a **warning stating the incompatible role definition** is shown. Likewise, the same warning is shown for business role definition (business role contains incompatible subroles), and when an identity requests new roles (for example, the currently assigned role is incompatible with the newly requested one). | ||
- | |||
- | |||
- | {{ : | ||
- | |||
- | {{ : | ||
- | |||
- | |||
- | ===== Automatically assigned roles by organization structure ===== | ||
The role can be linked to a Tree structure (e.g. position in organizational structure). That role is assigned to and removed from a user based on adding/ | The role can be linked to a Tree structure (e.g. position in organizational structure). That role is assigned to and removed from a user based on adding/ | ||
{{ : | {{ : | ||
- | ===== Automatically assigned roles by attribute ===== | + | ==== By identity attributes |
- | The role can be also linked with value in attribute (value can be stored in Identity, Identity extended attribute, Contract and Contract extended attribute). That role is assigned to and removed from a user based on the value in the specific attribute. Recalculating of this automatic roles is done after saving identity, identity extended attribute attributes, contract and contract extended attribute attributes. All necessary attributes that defined automatic role by attribute are defined by agenda " | + | The role can be also linked with value in attribute (value can be stored in Identity, Identity extended attribute, Contract and Contract extended attribute). That role is assigned to and removed from a user based on the value in the specific attribute. Recalculating of this automatic roles is done after saving identity, identity extended attribute attributes, contract, and contract extended attribute attributes. All necessary attributes that defined automatic role by attribute are defined by agenda " |
{{ : | {{ : | ||
- | After save identity (save from identity detail) it will be done recalculation for all automatic roles that has at least one rule with type IDENTITY, **recalculation from identity is done for all contracts for saved identity**. After save contract extended attributes (save from extended attribute detail) it will be done recalculation for all automatic roles that has at least one rule with type CONTRACT_EAV. | + | After saving |
- | ===== Requests for change automatically assigned roles ===== | + | ====== Read more ====== |
- | Automatically assigned roles have a significant safety impact. When creating, editing, or deleting, it is necessary that the process is approved. For this purpose, an agenda for requests for change of automatic roles has been created. | + | |
- | This request gets the approval process from the criticality defined for that role. Critical role determines what process the application must accomplish to implement it. | + | ===== Admin guide ===== |
- | + | | |
- | Processes of defined by the role criticality is defined | + | * [[.roles: |
- | Processes for approval change of an automatic role are different then processes using for approving assign role to one user. For clarity, both processes (role assignment, change of the automatic role) are defined in one final process. | + | * [[.roles: |
- | + | * [[.roles: | |
- | < | + | * [[.roles: |
- | ====== Read more ====== | + | |
+ | * [[.roles: | ||
===== Admin tutorials ===== | ===== Admin tutorials ===== | ||
Line 85: | Line 56: | ||
* [[tutorial: | * [[tutorial: | ||
* [[tutorial: | * [[tutorial: | ||
- | + | | |
- | ===== Admin guide ===== | + | |
- | | + | |
- | * [[.roles: | + | |
- | * [[.roles:adm:automatic_roles|Automatic | + | |
===== Devel guide ===== | ===== Devel guide ===== | ||
* [[.security: | * [[.security: | ||
* [[.identities: | * [[.identities: | ||
- | * [[.roles: | + | * [[.roles: |
- | * [[.roles: | + | * [[.roles: |