<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://uat.community.rws.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Working with roles</title><link>https://uat.community.rws.com/product-groups/trados-portfolio/business-manager/w/wiki/4942/working-with-roles</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12 Non-Production</generator><item><title>Working with roles</title><link>https://uat.community.rws.com/product-groups/trados-portfolio/business-manager/w/wiki/4942/working-with-roles</link><pubDate>Mon, 16 May 2022 06:35:58 GMT</pubDate><guid isPermaLink="false">10acfa76-f078-475b-a7ef-fc5b3e8d2934:b6713c7a-3079-4b5d-9b62-dbbcb5489cdf</guid><dc:creator>Eugene Kuchynski</dc:creator><comments>https://uat.community.rws.com/product-groups/trados-portfolio/business-manager/w/wiki/4942/working-with-roles#comments</comments><description>Current Revision posted to Wiki by Eugene Kuchynski on 5/16/2022 6:35:58 AM&lt;br /&gt;
&lt;p&gt;In the navigation tree, select&lt;span&gt;&amp;nbsp;&lt;strong&gt;Security&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;gt;&amp;nbsp;Roles&lt;/strong&gt;. Start with creating a new role or editing existing one.&lt;/p&gt;
&lt;p&gt;For example, when&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;Trados Business Manager&amp;nbsp;&lt;/span&gt;was launched for the first time, few default roles were created: Administrator, Default, Vendor, Customer, PM. As it is clear from its name, administrators has full access to all data. From the other hand, users with&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;role do not have access to any data at all. Try to login with the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;User&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;user name and you will see that navigation tree is almost empty - access rights are fully limited.&lt;/p&gt;
&lt;p&gt;Editing view for the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;role:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1619167427516v1.png" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Is administrative&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;box is not checked, and in the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Permission policy&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;field&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Deny all by default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;value is selected. This means that users with this role would not get access to any data unless you explicitly allow it in the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Type permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;tab. You can change&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Permission policy&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;value to&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Read only all by default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;and&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Allow all by default&lt;/strong&gt;. In the first case, a user will get access to all data without ability to edit it. In the second case, a user will get access to all operations. Depending on the selected value here you specify a way of working with&amp;nbsp;the&amp;nbsp;&lt;strong&gt;Type permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;tab. If default policy denies access by default, than in this tab you will specifying objects to allow access. And vice versa, if default policy allows access, then in this tab you will specify objects to restrict access to.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;The&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Type Permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;tab specifies access to all objects of a particular type. The image below illustrates this:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612869499511v3.png" /&gt;&lt;/p&gt;
&lt;p&gt;From now, user with&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;role assigned will be able to edit&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Units&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;table, but would not be able to delete any records from it.&lt;/p&gt;
&lt;p&gt;You can check and uncheck permission flags right in this list, but each type permission also has detailed configuration screen. If&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Read&lt;/strong&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Write&lt;/strong&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Create&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;and&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Delete&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;flags control permission for all objects, in the detailed configuration screen you can allow or deny these operations by applying additional criteria to objects (for example, allow editing &amp;#39;Words&amp;#39; unit but deny editing &amp;#39;Hours&amp;#39; unit).&lt;/p&gt;
&lt;p&gt;Click on the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Edit&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;button to open its editing form:&lt;br /&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612869941812v4.png" /&gt;&lt;/p&gt;
&lt;p&gt;In this window, you can adjust access rights in detail, on a level of individual objects and individual fields of these objects. In addition to&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Read&lt;/strong&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Write&lt;/strong&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Create&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;and&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Delete&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;rights you get access to two additional tables:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Member permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;and&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Object permissions&lt;/strong&gt;.&lt;/p&gt;
&lt;h1&gt;Combining roles&lt;/h1&gt;
&lt;p&gt;By creating multiple roles and selectively assigning them to users, you can create complex role combinations. However, you can choose how application behaves to determine access rights. By default, the system uses &lt;strong&gt;Granted in all roles&lt;/strong&gt; approach, which means that a user will have read/create/modify/delete access right if it is granted by &lt;strong&gt;ALL&amp;nbsp;&lt;/strong&gt;attached roles.&lt;/p&gt;
&lt;p&gt;Example. For example, you create a role when user can view and edit all translation jobs, and you wish to limit access only to jobs for Customer A. In this case, there could be 2 roles: first role allows access to all jobs, and second role sets &lt;strong&gt;DENY &lt;/strong&gt;(read/write/delete checkbox is unchecked) criteria for jobs where customer equals to &lt;strong&gt;Customer A&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;You can use &lt;strong&gt;appsettings_global,json&lt;/strong&gt; file to change this behavior. By changing value of the RoleMerging parameter to &lt;strong&gt;any&lt;/strong&gt; value (and restarting application or application pool after this change), application behavior will change - access will be granted if &lt;strong&gt;ANY&lt;/strong&gt; role allows some kind of access. In the example above, user will still have access to &lt;strong&gt;Customer A&lt;/strong&gt; jobs, because first role allows access to all jobs. To achieve the same result, in the first role you can add criteria (Customer does not equal to Customer A). Such approach allows to create a schema when you can easily combine many roles to construct a role with required access rights. For example, you can create separate roles providing access to entities depending on customer categories, and then add necessary roles to a user to provide them access only to specified categories. However, default approach requires to create roles which serve as exclusion rules, when first role provides full access, and additional roles &amp;quot;remove&amp;quot; some kind of access.&lt;/p&gt;
&lt;h1 class="name"&gt;Object permissions&lt;/h1&gt;
&lt;div class="content"&gt;
&lt;p&gt;An&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Object Permission&lt;/strong&gt;&lt;span&gt;&amp;nbsp;tab controls&amp;nbsp;&lt;/span&gt;access to object instances that fit a specified criteria.&lt;/p&gt;
&lt;p&gt;The following image illustrates the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Object Permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;tab in the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Type Operation Permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;dialog.&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612871007236v6.png" /&gt;&lt;/p&gt;
&lt;p&gt;In this example, while main type permission allows access to all Units, this object permission rule denies read/write/delete access to units where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Is time&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;box is not checked.&amp;nbsp;To build this criteria, a visual filter builder was used:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612871094621v7.png" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612871117411v8.png" /&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;h1 class="name"&gt;Member permissions&lt;/h1&gt;
&lt;div class="content"&gt;
&lt;p&gt;&lt;strong&gt;Member Permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;controls&lt;/span&gt;&amp;nbsp;access to specific members of an object.&lt;/p&gt;
&lt;p&gt;For example, users can have access to objects of a particular type and simultaneously have no access to several members of this type. For other example, it is possible to deny access to objects of a particular type and only allow access to a strict list of its members. It is possible to grant access to multiple properties with a single entry.&lt;/p&gt;
&lt;p&gt;In the example, let&amp;#39;s say we want to allow editing of all fields of a&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Unit&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;entity except adjustment factor. Then we can add a new row to this table, select&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Adjustment factor&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the field list and deny read/write access:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612870084895v5.png" /&gt;&lt;/p&gt;
&lt;p&gt;Now, when a user opens list of units, this column will be hidden. Additionally, while configuring member permissions,&amp;nbsp;you can use&amp;nbsp;&lt;strong&gt;Criteria&lt;/strong&gt;&lt;span&gt;&amp;nbsp;field, to&amp;nbsp;&lt;/span&gt;provide additional conditions for applying particular rights. Built-in criteria builder will help you to compose necessary criteria.&lt;/p&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: permissions, Roles, Users, Security&lt;/div&gt;
</description></item><item><title>Working with roles</title><link>https://uat.community.rws.com/product-groups/trados-portfolio/business-manager/w/wiki/4942/working-with-roles/revision/3</link><pubDate>Fri, 23 Apr 2021 08:43:55 GMT</pubDate><guid isPermaLink="false">10acfa76-f078-475b-a7ef-fc5b3e8d2934:b6713c7a-3079-4b5d-9b62-dbbcb5489cdf</guid><dc:creator>Eugene Kuchynski</dc:creator><comments>https://uat.community.rws.com/product-groups/trados-portfolio/business-manager/w/wiki/4942/working-with-roles#comments</comments><description>Revision 3 posted to Wiki by Eugene Kuchynski on 4/23/2021 8:43:55 AM&lt;br /&gt;
&lt;p&gt;In the navigation tree, select&lt;span&gt;&amp;nbsp;&lt;strong&gt;Security&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&amp;gt;&amp;nbsp;Roles&lt;/strong&gt;. Start with creating a new role or editing existing one.&lt;/p&gt;
&lt;p&gt;For example, when&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;SDL&amp;nbsp;&lt;/span&gt;&lt;span&gt;Trados Business Manager&amp;nbsp;&lt;/span&gt;was launched for the first time, few default roles were created: Administrator, Default, Vendor, Customer. As it is clear from its name, administrators has full access to all data. From the other hand, users with&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;role do not have access to any data at all. Try to login with the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;User&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;user name and you will see that navigation tree is almost empty - access rights are fully limited.&lt;/p&gt;
&lt;p&gt;Editing view for the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;role:&lt;/p&gt;
&lt;p&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1619167427516v1.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Is administrative&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;box is not checked, and in the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Permission policy&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;field&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Deny all by default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;value is selected. This means that users with this role would not get access to any data unless you explicitly allow it in the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Type permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;tab. You can change&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Permission policy&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;value to&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Read only all by default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;and&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Allow all by default&lt;/strong&gt;. In the first case, a user will get access to all data without ability to edit it. In the second case, a user will get access to all operations. Depending on the selected value here you specify a way of working with&amp;nbsp;the&amp;nbsp;&lt;strong&gt;Type permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;tab. If default policy denies access by default, than in this tab you will specifying objects to allow access. And vice versa, if default policy allows access, then in this tab you will specify objects to restrict access to.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;The&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Type Permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;tab specifies access to all objects of a particular type. The image below illustrates this:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612869499511v3.png" /&gt;&lt;/p&gt;
&lt;p&gt;From now, user with&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Default&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;role assigned will be able to edit&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Units&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;table, but would not be able to delete any records from it.&lt;/p&gt;
&lt;p&gt;You can check and uncheck permission flags right in this list, but each type permission also has detailed configuration screen. If&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Read&lt;/strong&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Write&lt;/strong&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Create&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;and&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Delete&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;flags control permission for all objects, in the detailed configuration screen you can allow or deny these operations by applying additional criteria to objects (for example, allow editing &amp;#39;Words&amp;#39; unit but deny editing &amp;#39;Hours&amp;#39; unit).&lt;/p&gt;
&lt;p&gt;Click on the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Edit&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;button to open its editing form:&lt;br /&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612869941812v4.png" /&gt;&lt;/p&gt;
&lt;p&gt;In this window, you can adjust access rights in detail, on a level of individual objects and individual fields of these objects. In addition to&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Read&lt;/strong&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Write&lt;/strong&gt;,&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Create&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;and&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Delete&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;rights you get access to two additional tables:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Member permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;and&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Object permissions&lt;/strong&gt;.&lt;/p&gt;
&lt;h1 class="name"&gt;Object permissions&lt;/h1&gt;
&lt;div class="content"&gt;
&lt;p&gt;An&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Object Permission&lt;/strong&gt;&lt;span&gt;&amp;nbsp;tab controls&amp;nbsp;&lt;/span&gt;access to object instances that fit a specified criteria.&lt;/p&gt;
&lt;p&gt;The following image illustrates the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Object Permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;tab in the&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Type Operation Permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;dialog.&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612871007236v6.png" /&gt;&lt;/p&gt;
&lt;p&gt;In this example, while main type permission allows access to all Units, this object permission rule denies read/write/delete access to units where&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Is time&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;box is not checked.&amp;nbsp;To build this criteria, a visual filter builder was used:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612871094621v7.png" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612871117411v8.png" /&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;h1 class="name"&gt;Member permissions&lt;/h1&gt;
&lt;div class="content"&gt;
&lt;p&gt;&lt;strong&gt;Member Permissions&lt;/strong&gt;&lt;span&gt;&amp;nbsp;controls&lt;/span&gt;&amp;nbsp;access to specific members of an object.&lt;/p&gt;
&lt;p&gt;For example, users can have access to objects of a particular type and simultaneously have no access to several members of this type. For other example, it is possible to deny access to objects of a particular type and only allow access to a strict list of its members. It is possible to grant access to multiple properties with a single entry.&lt;/p&gt;
&lt;p&gt;In the example, let&amp;#39;s say we want to allow editing of all fields of a&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Unit&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;entity except adjustment factor. Then we can add a new row to this table, select&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;strong&gt;Adjustment factor&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;in the field list and deny read/write access:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1612870084895v5.png" /&gt;&lt;/p&gt;
&lt;p&gt;Now, when a user opens list of units, this column will be hidden. Additionally, while configuring member permissions,&amp;nbsp;you can use&amp;nbsp;&lt;strong&gt;Criteria&lt;/strong&gt;&lt;span&gt;&amp;nbsp;field, to&amp;nbsp;&lt;/span&gt;provide additional conditions for applying particular rights. Built-in criteria builder will help you to compose necessary criteria.&lt;/p&gt;
&lt;/div&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: permissions, Roles, Users, Security&lt;/div&gt;
</description></item><item><title>Working with roles</title><link>https://uat.community.rws.com/product-groups/trados-portfolio/business-manager/w/wiki/4942/working-with-roles/revision/2</link><pubDate>Mon, 09 Dec 2019 06:39:54 GMT</pubDate><guid isPermaLink="false">10acfa76-f078-475b-a7ef-fc5b3e8d2934:b6713c7a-3079-4b5d-9b62-dbbcb5489cdf</guid><dc:creator>Eugene Kuchynski</dc:creator><comments>https://uat.community.rws.com/product-groups/trados-portfolio/business-manager/w/wiki/4942/working-with-roles#comments</comments><description>Revision 2 posted to Wiki by Eugene Kuchynski on 12/9/2019 6:39:54 AM&lt;br /&gt;
&lt;p&gt;In the navigation tree, select &lt;strong&gt;Other/tools &amp;gt;&amp;nbsp;Roles&lt;/strong&gt;. Start with creating a new role or editing existing one.&lt;/p&gt;
&lt;p&gt;For example, when &lt;span&gt;SDL&amp;nbsp;&lt;/span&gt;&lt;span&gt;Trados Business Manager&amp;nbsp;&lt;/span&gt;was launched for the first time, few default roles were created: Administrator, Default, Vendor, Customer. As it is clear from its name, administrators has full access to all data. From the other hand, users with &lt;strong&gt;Default&lt;/strong&gt; role do not have access to any data at all. Try to login with the &lt;strong&gt;User&lt;/strong&gt; user name and you will see that navigation tree is almost empty - access rights are fully limited.&lt;/p&gt;
&lt;p&gt;Editing view for the &lt;strong&gt;Default&lt;/strong&gt; role:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563347848947v1.png" /&gt;&lt;/p&gt;
&lt;p&gt;Both checkboxes are clear and in the &lt;strong&gt;Permission policy&lt;/strong&gt; field &lt;strong&gt;Deny all by default&lt;/strong&gt; value is selected. This means that users with this role would not get access to any data unless you explicitly allow it in the &lt;strong&gt;Navigation permissions&lt;/strong&gt; and &lt;strong&gt;Type permissions&lt;/strong&gt; tabs. You can change &lt;strong&gt;Permission policy&lt;/strong&gt; value to &lt;strong&gt;Read only all by default&lt;/strong&gt; and &lt;strong&gt;Allow all by default&lt;/strong&gt;. In the first case, a user will get access to all data without ability to edit it. In the second case, he/she will get access to all operations. Depending on the selected value here you specify a way of working with &lt;strong&gt;Navigation permissions&lt;/strong&gt; and &lt;strong&gt;Type permissions&lt;/strong&gt; tabs. If default policy denies access by default, than in these tabs you will specifying objects to allow access. And vice versa, if default policy allows access, than in these tabs you will specify object to restrict access to.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Navigation Permissions&lt;/strong&gt; allow you to grant or deny permissions for a single navigation item or for the whole navigation group as shown on the image below:&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563348049225v3.png" /&gt;&lt;/p&gt;
&lt;p&gt;Allowing access to &lt;strong&gt;Reference data&lt;/strong&gt; group will open access to all items in this group with read only rights. By default, permission policy dines all access. After giving access to the &lt;strong&gt;Reference data&lt;/strong&gt; group we expand this policy by giving additional rights. Since we use policy of restriction, given rights allow only to view data, but not edit it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Item permissions&lt;/strong&gt; have a greater priority than group permissions. For instance, you can deny access to the group, but grant access for one of its items, so this item will be enabled in the &lt;strong&gt;Navigation Panel&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Type Permissions&lt;/strong&gt; tab specifies access to all objects of a particular type. The image below illustrates this (in addition to previously granted access to the &lt;strong&gt;Reference data&lt;/strong&gt; group, we open write rights for the &lt;strong&gt;Units&lt;/strong&gt; table):&lt;/p&gt;
&lt;p&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563348184484v5.png" /&gt;&lt;/p&gt;
&lt;p&gt;From now, user with &lt;strong&gt;Default&lt;/strong&gt; role assigned will be able to edit &lt;strong&gt;Units&lt;/strong&gt; table, but would not be able to delete any records from it.&lt;/p&gt;
&lt;p&gt;If you wish to quickly fill this table with all object types available in the Business Manager, instead of manually adding rows one by one, click &lt;strong&gt;Pre-fill list of object types&lt;/strong&gt; button on the ribbon:&lt;br /&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563348222098v6.png" /&gt;&lt;/p&gt;
&lt;p&gt;Double click on the new type permission to open its editing form:&lt;br /&gt;&lt;img alt=" " src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563348298439v7.png" /&gt;&lt;/p&gt;
&lt;p&gt;In this window, you can adjust access rights in detail. In addition to &lt;strong&gt;Read&lt;/strong&gt;, &lt;strong&gt;Write&lt;/strong&gt;, &lt;strong&gt;Create&lt;/strong&gt; and &lt;strong&gt;Delete&lt;/strong&gt; rights you get access to two additional tables: &lt;strong&gt;Member permissions&lt;/strong&gt; and &lt;strong&gt;Object permissions&lt;/strong&gt;.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: permissions, Roles, Users, Security&lt;/div&gt;
</description></item><item><title>Working with roles</title><link>https://uat.community.rws.com/product-groups/trados-portfolio/business-manager/w/wiki/4942/working-with-roles/revision/1</link><pubDate>Wed, 17 Jul 2019 07:47:50 GMT</pubDate><guid isPermaLink="false">10acfa76-f078-475b-a7ef-fc5b3e8d2934:b6713c7a-3079-4b5d-9b62-dbbcb5489cdf</guid><dc:creator>Eugene Kuchynski</dc:creator><comments>https://uat.community.rws.com/product-groups/trados-portfolio/business-manager/w/wiki/4942/working-with-roles#comments</comments><description>Revision 1 posted to Wiki by Eugene Kuchynski on 7/17/2019 7:47:50 AM&lt;br /&gt;
&lt;p&gt;In the navigation tree, select &lt;strong&gt;Other/tools &amp;gt;&amp;nbsp;Roles&lt;/strong&gt;. Start with creating a new role or editing existing one.&lt;/p&gt;
&lt;p&gt;For example, when SDL BaccS was launched for the first time, few default roles were created: Administrator, Default, Vendor, Customer. As it is clear from its name, administrators has full access to all data. From the other hand, users with &lt;strong&gt;Default&lt;/strong&gt; role do not have access to any data at all. Try to login with the &lt;strong&gt;User&lt;/strong&gt; user name and you will see that navigation tree is almost empty - access rights are fully limited.&lt;/p&gt;
&lt;p&gt;Editing view for the &lt;strong&gt;Default&lt;/strong&gt; role:&lt;/p&gt;
&lt;p&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563347848947v1.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;Both checkboxes are clear and in the &lt;strong&gt;Permission policy&lt;/strong&gt; field &lt;strong&gt;Deny all by default&lt;/strong&gt; value is selected. This means that users with this role would not get access to any data unless you explicitly allow it in the &lt;strong&gt;Navigation permissions&lt;/strong&gt; and &lt;strong&gt;Type permissions&lt;/strong&gt; tabs. You can change &lt;strong&gt;Permission policy&lt;/strong&gt; value to &lt;strong&gt;Read only all by default&lt;/strong&gt; and &lt;strong&gt;Allow all by default&lt;/strong&gt;. In the first case, a user will get access to all data without ability to edit it. In the second case, he/she will get access to all operations. Depending on the selected value here you specify a way of working with &lt;strong&gt;Navigation permissions&lt;/strong&gt; and &lt;strong&gt;Type permissions&lt;/strong&gt; tabs. If default policy denies access by default, than in these tabs you will specifying objects to allow access. And vice versa, if default policy allows access, than in these tabs you will specify object to restrict access to.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Navigation Permissions&lt;/strong&gt; allow you to grant or deny permissions for a single navigation item or for the whole navigation group as shown on the image below:&lt;/p&gt;
&lt;p&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563348049225v3.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;Allowing access to &lt;strong&gt;Reference data&lt;/strong&gt; group will open access to all items in this group with read only rights. By default, permission policy dines all access. After giving access to the &lt;strong&gt;Reference data&lt;/strong&gt; group we expand this policy by giving additional rights. Since we use policy of restriction, given rights allow only to view data, but not edit it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Item permissions&lt;/strong&gt; have a greater priority than group permissions. For instance, you can deny access to the group, but grant access for one of its items, so this item will be enabled in the &lt;strong&gt;Navigation Panel&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;Type Permissions&lt;/strong&gt; tab specifies access to all objects of a particular type. The image below illustrates this (in addition to previously granted access to the &lt;strong&gt;Reference data&lt;/strong&gt; group, we open write rights for the &lt;strong&gt;Units&lt;/strong&gt; table):&lt;/p&gt;
&lt;p&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563348184484v5.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;From now, user with &lt;strong&gt;Default&lt;/strong&gt; role assigned will be able to edit &lt;strong&gt;Units&lt;/strong&gt; table, but would not be able to delete any records from it.&lt;/p&gt;
&lt;p&gt;If you wish to quickly fill this table with all object types available in BaccS, instead of manually adding rows one by one, click &lt;strong&gt;Pre-fill list of object types&lt;/strong&gt; button on the ribbon:&lt;br /&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563348222098v6.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;Double click on the new type permission to open its editing form:&lt;br /&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-wikis-components-files/00-00-00-02-93/pastedimage1563348298439v7.png" alt=" " /&gt;&lt;/p&gt;
&lt;p&gt;In this window, you can adjust access rights in detail. In addition to &lt;strong&gt;Read&lt;/strong&gt;, &lt;strong&gt;Write&lt;/strong&gt;, &lt;strong&gt;Create&lt;/strong&gt; and &lt;strong&gt;Delete&lt;/strong&gt; rights you get access to two additional tables: &lt;strong&gt;Member permissions&lt;/strong&gt; and &lt;strong&gt;Object permissions&lt;/strong&gt;.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: permissions, Roles, Users, Security&lt;/div&gt;
</description></item></channel></rss>