Insert excerpt | ||||||||
---|---|---|---|---|---|---|---|---|
|
This page is for application designers who need to specify which users can access an application.
Overview
Once an application is complete and ready for use, you need to configure the privileges that the application users require. To learn more about users, user groups, roles and privileges, see Managing User Groups and Privileges.
From version 9.0 onwards, PhixFlow automatically creates 2 user groups for applications:
appname
for people who need to use the applicationappname_Admin
for people who need to manage the application and user access to it.
where appname
is the same as the application's name. These users can be used with a role assigned, or can can simply be used to grant access where a user is a part of a group. For example, a user will need to be in the appname group in order to access the application and in the user groupd group to have adequate privieleg privileges to undertae undertake any activity. The appname_Admin, can then be assigned to specific objects and a user must be a pat part of this group to see/interact with them. For example, an admin options button can be set for appname_Admin use and only users in this groups group will see it.
For applications created in versions earlier than 9.0, you must create these user groups.
Configuring Application User Privileges
Anchor | ||||
---|---|---|---|---|
|
General Application Users require the following privilege privileges as a minimum. These can be setup in a bespoke role depending on your requirements, or alternatively use the prebuilt User role:
- Run Actions
- View Applications
- View Dashboards
- View Data
- View Components
- View Styles
- View Filters
- View Menu Items
- View Menus
- View Streams
- View Stream Actions
- View Stream Views
- View Styles
These can be set up in a bespoke role depending on your requirements, or alternatively, use the prebuilt User role.
Application Administrators, requirements will depend on your own requirements. For example, these might be user users who can see everything, including all data and perform any interaction. Alternatively, their role pay may be administrative only and they cannot see the data in an application.
Any privileges required.
Roles can be Configured
If you need to configure a role as their is not a preconfigure role that suits, you can do the following:
either create onIf none of the preconfigured roles suit your requirements, you can configure a role by either:
- create one in the Full Repository, if you want all applications to make use of the role.
- or, create one within an application, if you want to create a separate role for each application.
Step 1 Configure Roles and Privileges
- In either the Full Repository, or the application-specific repository, right-click Role and select click
.Insert excerpt _newaddIcon _newaddIcon nopanel true - In the role properties, set Basic Settings → Name. For example:
- for application users:
AppUser
- for application managers:
AppAdmin
- for application users:
- In the Roles section toolbar, click
to open the list of roles.Insert excerpt _roles _roles nopanel true - Drag in the privileges for the role.
- Click Click
to save and close the new role.Insert excerpt _finish _finish nopanel true
If you configure the roles in the Full Repository, you only need to do this once.
Step 2 Configure Users
If PhixFlow does not already have user accounts for your application users, ask your administrator to add them; see User.
Optionally Set Defaults
If a user only requires access to one application, configure Basic Settings → Default Application; see User.
If a user requires a task-specific landing screen, configure Basic Settings → Default Dashboard.
Step 3 Configure User Groups in the Application
- In the application-specific repository, expand User Groups and open the application's user group.
- Find the
AppUser
orAppAdmin
role:- For roles created within the application, in the Roles section toolbar, click
to open a list.Insert excerpt _roles _roles nopanel true - For roles created in the Full Repository, open the repository in a pane next to the user group properties and navigate to the role.
- For roles created within the application, in the Roles section toolbar, click
- Drag the role from the list/repository into the Role section.
- In the Users section of the user group properties, click
to open a list.Insert excerpt _user _user nopanel true - Drag users from the list into the Users section.
Restricting Access
Any application user can access all data and actions , unless you specifically configure restrictions.
Note |
---|
In general, we recommend providing all users with access to screens, tables, views and actions, as providing user access per item becomes complex and hard to manage. |
For the following items, their properties include options that are ticked by default.
- screens:
- Public
- All Users Can View Data
- tables: All Users Can View Data
- views: All Users Can View Data
- actionsConfiguring Actions: All Users Can Run ActionActions
For greater control over access to parts of your application, you can consider restricting access.
- For the item you want to restrict, untick All Users Can...
For screens, also untick Public. - PhixFlow displays properties to which you can add specific user groups.
Restricting access is most useful for where you want specific people:
- to perform key actions, such as approval or deletion.
- to access parts of your application.
In this case, you apply the restriction to actions on a button. The following section explains how configure user groups and privileges to create more complex access options.
Controlling Access Using Action Buttons
Anchor | ||||
---|---|---|---|---|
|
- Create a set of user groups to represent all application user roles.
- To each user group, add access to the actions buttons that the group of users need to access:
- tasks
- other screens
- Only associate the privileges specifically for this role, not for this role and everything “underneath” it.
- At least one user group must contain the AppUser role.
- Layer the user groups onto the users so that they end up with the access they need.