Authorization: What Users Can Access

Authorization refers to what users can access. The authorization to use the system is based on permissions. Permissions are managed by the administrator. The administrators must carefully grant permissions to all appropriate users.

Administrators: There are different types or levels of administrators, and they have various responsibilities, including (but not limited to) the end-to-end administration of Unifier.

Permissions: Unifier offers a flexible yet powerful permission-based security system, as opposed to role-based security. Role-based security by definition limits the user to a fixed set of functions or tasks. With permission-based security, access to all modules, functions, and tasks are controlled by granting each user any combination of permissions. These permissions consist of the ability to access specific tasks, and to perform specific actions within those tasks, such as create, modify, and view.

Permissions are granted to Users, or to Groups, to allow them access to features or functionalities.

Users: Individuals who use a functionality, if they have the permission granted to them to do so, by the administrator.

Groups: The Groups option makes it easier for the administrators to assign permission sets to multiple users (a group of users) at the same time. The administrators can use Groups to group users who will be using the same functionality, and assign the same permissions to all users in the group. Anytime a new person comes onto the project or shell, the administrator can assign the new person to a group, and the new person's permissions will be set automatically.

Specific permission settings are described in the Unifier Data Reference Guide.

See Also

Security Considerations

Authentication: How Users Sign On

Endpoint Security

Confidentiality

Integration with Other Applications

Security for Developers - API Security

Establishing Security Contacts



Last Published Tuesday, December 12, 2023