2023:Permission Sets: Difference between revisions
No edit summary |
No edit summary |
||
| Line 22: | Line 22: | ||
# Designer permissions | # Designer permissions | ||
#* Grooper admins and designers should be given full access to all pages, including Design. | #* Grooper admins and designers should be given full access to all pages, including Design. | ||
#* This will give this users full control to configure Grooper nodes in Design, as well as full rights to review Batches in the Batches and Tasks pages. | #* This will give this users full control to configure Grooper nodes in Design, as well as full rights to review '''Batches''' in the "Batches" and "Tasks" pages. | ||
# Reviewer permissions | # Reviewer permissions | ||
#* Grooper reviewers should have more limited access. Typically, they will only be given access to the Batches and/or Tasks pages and NEVER the Design page. | #* Grooper reviewers should have more limited access. Typically, they will only be given access to the "Batches" and/or "Tasks" pages and NEVER the "Design" page. | ||
#* This will allow reviewers to review Batches in the Batches and/or Tasks pages, but restrict their ability to configure Grooper nodes in Design. | #* This will allow reviewers to review '''Batches''' in the "Batches" and/or "Tasks" pages, but restrict their ability to configure Grooper nodes in "Design". | ||
Revision as of 11:29, 28 March 2023
A Permission Set is a property that allows you to restrict user access to repositories, pages, and certain activities. This helps eliminate the possibility of an unauthorized individual from editing or deleting information or Batches.
In this article we will show you how to add and update Permission Sets to access different areas of a repository in Grooper 2023.
| ‼ |
New Functionality in 2023: Not only can you now restrict access to certain areas of a repository, you can now restrict what actions individuals can take while working in Grooper! |
About
There may be times where you do not want everyone to have full access to your Grooper repository. After putting in hours of work into customizing your repository design for your company needs, you do not necessarily want someone without training being able to edit your work.
You may have some employees that design the repository and you may have others that simply review the extracted data. Each employee working in Grooper may have different needs and require different restrictions. With Permission Sets you can customize who has access to which page of the Grooper repository.
A common Permission Sets configuration will add two sets of permissions:
- Designer permissions
- Grooper admins and designers should be given full access to all pages, including Design.
- This will give this users full control to configure Grooper nodes in Design, as well as full rights to review Batches in the "Batches" and "Tasks" pages.
- Reviewer permissions
- Grooper reviewers should have more limited access. Typically, they will only be given access to the "Batches" and/or "Tasks" pages and NEVER the "Design" page.
- This will allow reviewers to review Batches in the "Batches" and/or "Tasks" pages, but restrict their ability to configure Grooper nodes in "Design".
You can also restrict what actions an individual can take while working in Grooper. If you want to avoid someone accidentally deleting a batch or clicking cut instead of copy, you can restrict those actions.
How To
Adding Permission Sets
There are two parts to configuring permission sets:
- granting/restricting page access
- granting/restricting object command permissions.
Page Access
The first part of configuring permission sets is configuring what groups can have access to which pages in Grooper. By default, everyone has access to every page in your repository. For example, if you would like users to only have access to the "Batches" and "Tasks" pages, we can do that here.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ⚠ |
Please note that any user browsing the web client has their permission sets cached for their current session. If you change their accessibility in the permission sets, they will not see those changes take place until they are logged out of the current session. After saving your Permission Sets in the Grooper web client, as best practice to eliminate any security risks by recycling the app pool in IIS. This will force them to log out of their current session. |
Object Command Permissions
You may want to restrict which commands a user can apply to an object in Grooper. For example, you may have a group of review users who are purely data entry clerks. A smaller group of review users may be charged with administrating Batches (deleting Batches, updating their Batch Processes when changes are published, or resetting completed steps). You can use the Permissions properties to allow the review admins to perform commands, like deleting a Batch, but prevent the data clerk reviewers from doing so. This tutorial will show you how to remove a user's right to delete a Batch. |
|
|
|
|
|
|
|
|
|
|
|
|
| ⚠ |
Please note that any user browsing the web client has their permission sets cached for their current session. If you change their accessibility in the permission sets, they will not see those changes take place until they are logged out of the current session. After saving your Permission Sets in the Grooper web client, it is best practice to recycle the Grooper app pool in IIS on the web server. This will force them to log out of their current session, eliminating potential security risks. |














