Controlling User Access

The Access Control Editor provides the option to control user access, e.g. for reading or modifying folders and documents and to give permission on access control settings on these. Please note that document permissions on folders are working recursively, thus if modify access to a folder is not permitted, none of the documents in this folder or sub-folders can be modified.

The Access Control Editor is opened via the Security Settings option in a Document context menu. Refer to section Setting Security of chapter Document Operations for details.

The editor contains the following two tables:

Access Control Editor
Figure: Access Control Editor

Note
To use security with Jackrabbit in the rapid application environment, you have to enable security setting as described in the following section.

Enabling Security in RAD

To make security work with Jackrabbit, perform the following steps:

  1. Stop the server
  2. In folder carnot-jackrabbit/WEB-INF/jackrabbit:
  3. In folder carnot-jackrabbit/WEB-INF/config/ipp/spring:
  4. Create new JCR
  5. Republish and restart the server

Security Files
Figure: Replaced security files in RAD.

Policies on folder creation

Please note that implicit policies are only set on folder creation with the security enabled. In case you set the security after a folder is already created from a non security enabled repository access, the policy is not retroactively set. A user without administrator role does not have access to this folder. In this case a user with administrator role has to set policies on the folder manually. For example to make it possible to upload documents, policies on the folder /process-instances have to be set manually if it was created before the security setting.

For the following folder pattern, the permission ALL is set on creation for everyone in case security is enabled:

Participant Permissions

The following permissions are provided for participants:

Inherit: inherit permission for according action on folder/document

Allow: allow according action on folder/document

Deny: deny according action on folder/document

Inherited Permissions

The table with inherited permissions lists the permissions inherited from parent folders. These entries are not editable.

Inherited Permissions on Folders

The following columns are listed for inherited permissions on folders:

Access Control Editor - Inherited Permissions
Figure: Inherited Permissions for a folder.

Default inherited folder permissions

Per default, inherited permissions for Administrators and Everyone are set. Administrators have the grant Allow for all permissions. Everyone has an Allow value set for the reading grant, whereas all other permissions for Everyone are Inherit (indicated by three dashes) by default.

Inherited Permissions on Documents

The following columns are listed for inherited permissions on documents:

Access Control Editor - Inherited Permissions
Figure: Inherited Permissions for a document.

Default inherited document permissions

Per default, inherited permissions for Administrators and Everyone are set. Administrators have the grant Allow for all permissions. Everyone has an Allow value set for the reading grant, whereas all other permissions for Everyone are Inherit (indicated by three dashes) by default.

Granted Permissions

Depending on whether the Access Control Editor was opened for a folder or for a document, one of the following tables are available:

The following operations on permissions are provided:

Granted Permissions on Folders

Granted permissions on folders have a table with the following columns:


Access Control Editor - Granted Permissions
Figure: Granted Permissions on a Folder

Granted Permissions on Documents

Granted permissions on documents have a table with the following columns:


Access Control Editor - Granted Permissions
Figure: Granted Permissions on a Document

Adding Participants

To add a participant to change the permission of, click the Add Participant icon:

Add Participant
Figure: Add Participant

The Select Participant dialog opens, where you can select the participant in a list. The allowed participants are role, organization, department and its sub-organization and children.

Select a Participant.
Figure: Select a Participant

OR

Click the link Pick from Tree. The participant tree gets displayed. Select the participant from the tree.

Select a Participant
Figure: Participant Tree

The selected participant is created in the table with editable permissions.

Added Participant
Figure: Participant added to table

Note that the access can be granted to a role but when the role is scoped, the accessing user's scope that is department is also displayed. So, if a user would not be allowed to see or work with a process instance due to department association then similarly, the access to the process attachment is denied to that user.

Removing Participants

To remove selected participant(s) from the permissions table, you can either:

Selecting one or more participant(s) in the table is done by clicking directly on the according row(s). For details on selecting rows in tables, refer to chapter Selecting Rows in a Table. Note that administrators cannot be removed and will remain even in case all rows are selected.

Editing Permissions

To edit selected permission(s) you can do one of the following:

Now the permission for the participant(s) can be edited.

Edit Permission Result
Figure: Permissions can be edited now.

You can switch the granted permissions in the columns between the following values provided in the drop-down list:

Permission
Figure: Set the Permission.

Click Apply to apply your changes.