Set Security
  • 26 Mar 2024
  • 1 Minute to read
  • Contributors
  • Dark
    Light

Set Security

  • Dark
    Light

Article Summary

Syniti Construct's centralized user management functionality controls user access to standard and custom Syniti Construct applications (pages). It also controls user access to content within standard Syniti Construct applications and provides functionality to extend to user content assignment within custom applications.

  • A user's access to Syniti Construct application is driven by WebApp group assignment either via a security role (of type Application or Standard).

  • A user's content access is driven by Security Definition Key Value assignment either via a security role (of type Content or Standard).

Syniti Construct is shipped with default ‘Standard' security roles that provide differentiated user application access across all Syniti Construct solutions and components. Refer to Delivered Security Roles for more information.

Additionally, Syniti Construct applications include a range of WebApp groups intended to be used as building blocks for custom security roles. Refer to Delivered WebApp Groups for more information.

Note

Roles with a role type of Standard can be used to provide BOTH Application and Content access.

To set security in the Syniti Construct:

There are two ways to create an Application security role, the first step in security set up.

  1. Create an Application security role from an existing role by Copying a Delivered Security Role.

    Note

    Rename the role, and set the ROLE TYPE to Application.s

  2. Add or change WebApp groups assigned to the security role.

OR

  1. Create a security role with the Type of Application Manually.

  2. Add or change WebApp groups assigned to the security role.

To continue setting up security, create content security roles to give content access

  1. Create a security role with the Type of Content manually.

  2. Assign Security Definition Keys to the security role.

When adding user accounts, Security Administrators assign users to Application and Content security roles.


Was this article helpful?

What's Next