Mapping Users to Roles
Depending on the authentication or user management mechanism used, the role that a user should have is specified and then mapped to a group set in Streams.properties.
Property | Description | Default Value |
access.administrator.groups |
The role that is mapped to the administrator group. Allowed to perform the following:
|
admin |
access.default.roles |
The default roles applied to all users of the server. For example, if access.default.roles=DESIGNER,ADMINISTRATOR and a user with a VIEWER role logs on to the server, then the user will simultaneously have a VIEWER, DESIGNER, and ADMINISTRATOR roles. However, if no default roles are wanted, then leave the property blank. NOTE: The roles that can be assigned in this property can only be ADMINISTRATOR, |
VIEWER |
access.designer.groups |
The role that is mapped to the designer group. Allowed to perform the following:
|
designer |
access.viewer.groups |
The role that is assigned to the viewer group. Allowed to view the engine status. |
viewer |
NOTE: Group sets can be added for a role, by default separated by a comma.
Normally, you should use role mapping to control user access. This way you can manage access in the same place that you manage your users without having to reconfigure the server.
In some scenarios, it may be impossible to set up appropriate roles for Panopticon in your external system, or you may want to make one-off exceptions for specific users. As a workaround for these cases, you can also explicitly list individual users and their access in the server configuration with the access.administrator.users, access.designer.users, and access.viewer.users properties.
(c) 2013-2024 Altair Engineering Inc. All Rights Reserved.