Managing Policy Studio Users

Contents

Overview

The Policy Studio has its own user store. This means that when logging into the Policy Studio to access a particular process, you must enter the credentials of a user stored in its user store to enable the Policy Studio to connect to the process.

Policy Studio Users are responsible for managing server Processes, Configuration Profiles, and in the case of Super Users, other Policy Studio Users. You can manage Policy Studio Users by clicking the Users button at the top left of the Oracle Enterprise Gateway Dashboard.

Note:
Policy Studio Users provide access to the configuration and process management features in Policy Studio. Whereas Enterprise Gateway Users provide access to the messages and services protected by the Enterprise Gateway. For more details, see the Enterprise Gateway Users topic.

Super User Privileges

After installation, a single Super User is defined in the Policy Studio. This User is named admin, and has a default password of changeme. The Super User has its own set of Configuration Profiles and Processes like any other User. However, the Super User also has special rights in the system, which include the following:

  • Add, delete, and update other Users.
  • Reset User passwords.
  • Add another Super User.
  • Perform actions normally only allowed by a Configuration Profile owner (for example, transfer ownership of a Configuration Profile to another User).
  • Perform actions normally only allowed by a Process owner (for example, deploy a new Configuration Profile to a Process owned by another User).

Important Note:
A Super User cannot delete itself.

Removing the default Super User
If you wish to remove the default Super User, perform the following steps:

  1. Add another Super User.
  2. Log in as the new Super User.
  3. Delete the default Super User.

The User List dialog displays all existing Policy Studio Users. Super Users can use this dialog to add, update, and delete Users. These tasks are explained in the sections that follow.

Adding a New User

Complete the following steps to add a new Policy Studio User to the system:

  1. Click the Users button at the top left of the Enterprise Gateway Dashboard to display the User List dialog.
  2. Click the Add button.
  3. In the Add new user dialog, enter a name for the User in the User ID field.
  4. Enter a user password in the Password field.
  5. Select roles for the user from the list of available roles (for example, Administrators or Deployers).
  6. Click OK.

Removing a User

To remove a User, select it in the Username list, click the Remove button, and click OK to confirm. The user is removed from the list. When the Super User deletes a User, the following occurs in the Policy Studio:

  • All Configuration Profiles owned by that User are assigned to the Super User.
  • All Processes owned by that User are assigned to the Super User.
  • The underlying configuration that holds the Configuration Profiles and Processes for that User is removed from the Policy Studio configuration.
  • The User is removed from the Policy Studio configuration.

Resetting a User Password

You can reset a User password as follows:

  1. Select the User in the Username list.
  2. Click the Reset Password button.
  3. In the Reset Password dialog, specify and confirm the new password.
  4. Click OK.

Managing User Roles

You can manage the roles that are assigned to specific users as follows:

  1. Select the User in the Username list.
  2. Click the Edit User Roles button.
  3. Select the user roles that you wish to enable for this user in the dialog (for example, Operators and/or Auditors).
  4. Click OK.

Editing Roles
You can click the Edit Roles button to add or delete specific roles that can be enabled for users. You must also add any new roles to the acl.policy file in the conf directory of your Enterprise Gateway installation. For full details on managing roles, see the topic on Configuring Role-Based Access Control. For example, this explains how to add, edit, and delete specific roles using the Role-Based Access Control (RBAC) model.