8.3.3. Authorization¶
8.3.3.1. Policy setting on Authorization Setting Screen will be in effect immediately.¶
- Policy setting on the authorization setting screen (permitted, not permitted) will be in effect immediately.
8.3.3.2. There are remarks about add/update/delete of authorization subject.¶
Authorization subject is made common across each function.Please be aware that add/update/delete of authorization subject will affect each setting screen.
Authorization Setting Screen
Authorization Setting Screen for Company
Authorization Setting Screen for Menu Group
Access Right Setting Screen for Portlet<*> Subject is screened only for portlet.
- Display Authentication, User, Role
- Non Display Department, Post, Public Group
TableMaintenance Table Access Right Setting
Event Navigator Access Right Setting
IMBox Operations Authority Setting
Please make sure that update/delete is not used in other functions.Special care must be taken for the deletion of subject.If the subject is deleted, related policy setting is deleted too.Therefore, if the subject is deleted, policy that was set by other functions is also deleted.
8.3.3.3. Validity check of Authorization for the router path will not be performed on the dynamic routing.¶
In the unit test environment, router checks if different authorization setting is made for the path at initialization time.This checking is not performed for dynamic routing.Following routings are considered as dynamic routing.
- routing which uses PathVariables
- routing by folder-mapping of jssp-routing
- routing by application-mapping of service-routing
8.3.3.4. Authorization setting for “/home” is defined as separate resources. Care should be taken when the authorization is changed.¶
At present /home does not represent any particular application.If /home is accessed in the initial setting stage, portal (/imart/portal/desktop) will be displayed.This was made possible by making both paths in the routing table point to the same page.Since they are defined as separate resources from the authorization viewpoint, you should be careful when you change their authorities.Portal ResourceScreen/ProcessPortalPortal DisplayPortal/home ResourceScreen/ProcessTenantDefault HomeIn the example of default status stated above, even if you disable authorization of only the portal resource,/home can be accessed and portal can be viewed unless you disable the authorization of default home.
8.3.3.5. Latest authorization setting may not be always in effect.¶
If the network trouble has occurred between clusters in the distributed environment,cache information at the node in trouble may not be cleared, and iAP may function with old authorization setting.There are following alternatives to avoid this situation.
- Do not change the authorization setting in Operation Phase (= operation that does not cause cache to be cleared).
- Identify the node in which the trouble has occurred, and perform rebooting etc.
- Do not cache authorization setting.
- Make the cache validity time short for authorization setting.
If authorization setting change is executed while any node is separated from the cluster because of network trouble or other causes,cache in the separated node is not cleared.When the node joins the cluster again,authorization setting that was cached before it left the cluster will be applied for the access control.
8.3.3.8. Authorized resource provided by intra-mart Accel Platform should not be deleted.¶
If the authorized resource provided by intra-mart Accel Platform is deleted, tenant environment setup may not work properly.For example, please assume that the authorized resource provided by [8.0.0] or [8.0.1] is deleted.If you try to set up the tenant environment deploying the WAR file which selectes the product version [8.0.2] or later,your tenant environment setup will fail.
8.3.3.9. On the authorization setting screen, resources and conditions are filtered by the display name of locale of log-in user.¶
In the search function on authorization setting screen, resources and conditions that have no display name by the locale of log-in user would not be the target data for the search function.
8.3.3.10. Target user conditions for IM-Authz (Authorization) only handle default department sets.¶
Specifically, following searches are applicable.・User Search・Company Department Search・Post Search