Difference between revisions of "Auth Portlet"

From Gcube Wiki
Jump to: navigation, search
(Introduction)
(Insert a Policy)
Line 31: Line 31:
 
*Write
 
*Write
  
==Insert a Policy==
+
==Insert/Modify a Policy==
  
 +
For insert a policy we can add one or more Caller, one service and access type.
 +
 +
The insertion of a caller can be made with an autocomplete writing in the input, or clicking the button Add User role or add service, that opens a pop-up to insert more things.
 +
 +
We can create a policy that inserts all users or all role with  the specific button “All Users” or “All Role”
 +
 +
The insertion of a caller can be made  with complete  input text , or clicking  button “Add User/ Role” or “Add Service” to open a pop up for multiple entry.
 +
 +
The insertion with an autocomplete can be made with the insertion of a first controlled character:
 +
 +
*if you insert a user, you can digit @ for see all users
 +
*if you insert a role, you can digit # for see all roles
 +
*if you want insert a service, you can digit $ for see all the services.
  
  
 
[[Image:AuthPortlet_InsertPopUp.png|500px|center|Auth Portlet Insert a Policy]]
 
[[Image:AuthPortlet_InsertPopUp.png|500px|center|Auth Portlet Insert a Policy]]
 +
 +
The selection of the service and the access type It’s done with a selected dropdown
 +
 +
We can insert a policy that allows the use of a service only to one or more caller, selecting the combination ALL Users/All role and Except.
 +
 +
In this case, the callers, entered in input text, are enabled to access a service.
 +
 +
For an existing policy, you can change only the service and the access type.
  
 
==Search a Policy==
 
==Search a Policy==

Revision as of 21:58, 4 October 2016

Introduction

With this portlet it’s possible to create a policy to deny access to services in the current context.

Below it is shown the overall layout of the Auth Portlet

Auth Portlet Overall

Every policy is consisting of:

  1. one or more Caller
  2. Service
  3. Access


The caller can be an User, a Role or a Service and you can insert one or more callers for each policy.

(The insertion of a policy with more callers results as more policy).

The service is specified as service class, service name and service id.

The access that we want to deny can be:

  • All
  • Access
  • Delete
  • Execute
  • Write

Insert/Modify a Policy

For insert a policy we can add one or more Caller, one service and access type.

The insertion of a caller can be made with an autocomplete writing in the input, or clicking the button Add User role or add service, that opens a pop-up to insert more things.

We can create a policy that inserts all users or all role with the specific button “All Users” or “All Role”

The insertion of a caller can be made with complete input text , or clicking button “Add User/ Role” or “Add Service” to open a pop up for multiple entry.

The insertion with an autocomplete can be made with the insertion of a first controlled character:

  • if you insert a user, you can digit @ for see all users
  • if you insert a role, you can digit # for see all roles
  • if you want insert a service, you can digit $ for see all the services.


Auth Portlet Insert a Policy

The selection of the service and the access type It’s done with a selected dropdown

We can insert a policy that allows the use of a service only to one or more caller, selecting the combination ALL Users/All role and Except.

In this case, the callers, entered in input text, are enabled to access a service.

For an existing policy, you can change only the service and the access type.

Search a Policy

It Is possible search, filter and group by all policy.


Auth Portlet Filter a Policy


Auth Portlet Search a Policy

If we want to search a caller, we can digit @ before inserting a name of the caller.

If we want to search a service, we can digit $ before inserting a name of the service.

And finally if we want to search an access, we can digit * before inserting a type of an access.

The filter can be incremental.


Auth Portlet Search a Policy


Over the filter we can organize a policy in caller type, for example user, role and service

Auth Portlet Group a Policy

Delete a Policy

It’s possible to delete one or more policies simply clicking on the delete button.

Auth Portlet Example Delete check a Policy


Auth Portlet Delete a Policy