2023:Permission Sets: Difference between revisions
Dgreenwood (talk | contribs) |
Dgreenwood (talk | contribs) |
||
| Line 161: | Line 161: | ||
Please note that any user browsing the web client has their permission sets cached for their current session. If you change their accessibility in the permission sets, they will not see those changes take place until they are logged out of the current session. | Please note that any user browsing the web client has their permission sets cached for their current session. If you change their accessibility in the permission sets, they will not see those changes take place until they are logged out of the current session. | ||
After saving your '''''Permission Sets''''' in the Grooper web client, | After saving your '''''Permission Sets''''' in the Grooper web client, it is best practice to recycle the Grooper app pool in IIS on the web server. This will force them to log out of their current session, eliminating potential security risks. | ||
|} | |} | ||
</tab> | </tab> | ||
[[#Adding Permission Sets|Click here to return to the top of the section]] | :[[#Adding Permission Sets|Click here to return to the top of the section]] | ||
</tabs> | </tabs> | ||
Revision as of 11:15, 23 March 2023
Add Permission Sets to Grooper 2023
In this article we will show you how to add and update Permission Sets to access different areas of a repository in Grooper 2023.
| ‼ |
New Functionality in 2023: Not only can you now restrict access to certain areas of a repository, you can now restrict what actions individuals can take while working in Grooper! |
About
There may be times where you do not want everyone to have full access to your Grooper repository. After putting in hours of work into customizing your repository design for your company needs, you do not necessarily want someone without training being able to edit your work.
You may have some employees that design the repository and you may have others that simply review the extracted data. Each employee working in Grooper may have different needs and require different restrictions. With Permission Sets you can customize who has access to which page of the Grooper repository.
A common Permission Sets configuration will add two sets of permissions:
- Designer permissions
- Grooper admins and designers should be given full access to all pages, including Design.
- This will give this users full control to configure Grooper nodes in Design, as well as full rights to review Batches in the Batches and Tasks pages.
- Reviewer permissions
- Grooper reviewers should have more limited access. Typically, they will only be given access to the Batches and/or Tasks pages and NEVER the Design page.
- This will allow reviewers to review Batches in the Batches and/or Tasks pages, but restrict their ability to configure Grooper nodes in Design.
You can also restrict what actions an individual can take while working in Grooper. If you want to avoid someone accidentally deleting a batch or clicking cut instead of copy, you can restrict those actions.
How To
Adding Permission Sets
There are two parts to configuring permission sets:
- granting/restricting page access
- granting/restricting object command permissions.
Page Access
The first part of configuring permission sets is configuring what groups can have access to which pages in Grooper. By default, everyone has access to every page in your repository. For example, if you would like users to only have access to the "Batches" and "Tasks" pages, we can do that here.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ⚠ |
Please note that any user browsing the web client has their permission sets cached for their current session. If you change their accessibility in the permission sets, they will not see those changes take place until they are logged out of the current session. After saving your Permission Sets in the Grooper web client, as best practice to eliminate any security risks by recycling the app pool in IIS. This will force them to log out of their current session. |
Permissions
|
|
|
|
|
|
|
|
|
|
|
|
|
| ⚠ |
Please note that any user browsing the web client has their permission sets cached for their current session. If you change their accessibility in the permission sets, they will not see those changes take place until they are logged out of the current session. After saving your Permission Sets in the Grooper web client, it is best practice to recycle the Grooper app pool in IIS on the web server. This will force them to log out of their current session, eliminating potential security risks. |














