[Index]

Model: data/AccessProfile

Access Profile Permissions and Operations

Full HTML Help

Administrators above Provider level can maintain access profiles as a part of role management. For example, hcsadmin.

An access profile assigned to a role provides a general set of permissions and type-specific operations that are associated with specific models.

For type-specific operations, wild cards may be used in model references, for example data/*.

Note

Type-specific permissions that are also configured as general permitted operations will override the general permissions.

The default access profiles show typical configurations, for example an Operator-type profile at a hierarchy would only require Read type-specific permissions, while the administrator profile at the same hierarchy would have Create, Update and Delete permissions for the same type.

The default access profiles of the following administrators above Provider level have full general and type-specific permissions to all models:

The lists below provide details on the types of settings.

Related Topics

Introduction to Access Profiles in the Core Feature Guide

Access Profiles

Clone an Access Profile

Procedure

  1. Log in as hcsadmin.
  2. Choose Role Management > Access Profiles.
  3. Click on the Access Profile you want to clone.
  4. Click Action > Clone.
  5. Enter the name, description and assign the necessary permissions for the Access Profile you are creating.
  6. Click Save.

Access Profiles Miscellaneous Permissions

The following table provides an explanation of the Miscellaneous Permissions that can be set on an Access Profile.

Name API URL Description
Api Root /api/ For example to allow display of the model tree view.
Device Type Root /api/device/cucm/ Typically used to drill down into model types of a given device type in the model tree view.
Export /api/export/export_data/ /api/export/bulkload_ template/ For export of resources and bulkload template.
Help /api/help/ For help tree.
Help Export /api/help/export/ Export help as zip.
Meta Schema /api/meta_schema/ To access the schema of resource meta data section.
Model Type Choices /api/data/choices/ /api/device/choices/ /api/tool/choices/ /api/wizard/choices/ /api/domain/choices/  
Model Type Root /api/data/ /api/device/ Typically used to drill down in the model tree view.
Operations /api/operations/ A list of all the misc permissions (API operations that do not map to a model type, tool, and so on).
Tool Root /api/tool/ Displays a list of all tools available.
Type Operation /api/+tag_version/ Grants access to non-model-type-specific custom operations.
Upload /api/uploadfiles/ Uploading of files, for example used by bulk load, import, and the data/File model.

Access Profiles Type Specific Permissions

The following table provides an explanation of the Permitted Operations for the associated Permitted Types that can be set on an Access Profile.

The Permitted Types that are classified into Create-Read-Update-Delete groups:

Create

Name Description
Add Grants access to the form used to enter data for a new model instance, for example: HTTP GET on /api/data/User/add/.
Create Grants access to create a new instance of a given model type, for example: HTTP POST on /api/data/User/.

Read

Name Description
Choices Grants access to view a list of all instances of a given model type, which is used to populate drop downs, for example: HTTP GET on /api/data/User/choices/.
Config Grants access to the form used to create a data/ConfigurationTemplate model for a given model type, for example: HTTP GET on /api/data/User/config/.
Display Policy Grants access to the form used to create a data/FieldDisplayPolicy model for a given model type, for example: HTTP GET on /api/data/User/display_policy/.
Get Grants access to retrieve instance data, for example: HTTP GET on /api/data/User/<pkid>/.
Help Grants access to viewing help of a given model type, for example: HTTP GET on /api/data/User/help/.
List Grants access to listing all instance of a model type, for example: HTTP GET on /api/data/User/.
Meta Choices Deprecated.
Operation Schema Grants access to view schema of custom operations, for example: HTTP GET on /api/data/User/+tag/schema/.
Property Choices Grants access to listing all the attributes of a given model as choices. Typically used to populate drop-down in GUI rule drop-downs,
Schema Grants access to the schema of a given model type, for example: HTTP GET on /api/data/User/schema/.
Template Choices Grants access to view a list of all instances of a given template model type, particularly for populating drop downs, for example: HTTP GET on data/DataModel, data/DomainModel, data/ProvisioningWorkflow, data/ConfigurationTemplate, data/Macro, and data/FieldDisplayPolicy. Unlike the 'Choices' operation the search for template choices apply system-specific rules, such as only searching up the hierarchy.

Update

Name Description
Replace Grants access to overwrite an entire model instance, for example: HTTP PUT on /api/data/User/<pkid>/.
Update Grants access to update a model instance, for example: HTTP PATCH on /api/data/User/<pkid>/.
Bulk Update Grants access to the feature that allows a user to modify multiple model instances in a single request, for example: HTTP POST on/api/data/User/bulk_update/.
Bulk Update Form Grants access to the form used to enter date for the Bulk Update operation, for example: HTTP GET on /api/data/User/bulk_update/.
Migration Grants access to the model migration form, for example: HTTP GET on /api/data/User/migration/.

Delete

Name Description
Remove Grants access to deleting model instances, for example: HTTP DELETE on /api/data/User/.

The operations that do not fall into these four groups, are explained in the following table.

Name Description
Download Grants access to tool download capabilities a given type, typically tool, for example: HTTP POST on /api/tool/Theme/<pkid>/?action=download.
Execute Grants access to execute a given model instance, for example: HTTP POST on /api/data/ProvisioningWorkflow/<pkid>/execute/.
Graph Grants access to viewing a graph for a type, typically the search tool, for example: HTTP GET on /api/tool/Search/graph/.
Import Grants access to import device models for the device referenced by the given instance, for example: HTTP POST on /api/data/Ldap/<pkid>/import/.
Import Device [Will be deprecated] Grants access to import device models for the device referenced by the given instance, for example: HTTP POST on /api/data/Ldap/<pkid>/import/.
Instance Operation Grants access to all custom operation of a given model, for example: HTTP POST/PUT/PATCH on /api/data/Countries/<pkid>/+tag/.
Instance Operation By Method Grants access to all custom operation of a given model with the operation name as a URL parameter, for example: HTTP POST on /api/data/Countries/<pkid>/?method=tag.
Operations Grants access to list, as choices, all supported operations for a given model type, for example: HTTP GET on /api/data/User/operations/.
Replay Grants access to transaction replay, for example: HTTP GET on /api/tool/Transaction/<transaction_id>/replay/.
Report Deprecated, for example: HTTP GET on /api/tool/Search/report/.
Run Saved Search Grants access to fetching results of a saved search, for example: HTTP GET on /api/tool/Search/saved_search/.
Sub Transactions Grants access to view s/DomainModelub-transaction of a given transaction, for example: HTTP GET on /api/tool/Transaction/<transaction_id>/sub-transactions/.
Test Connect Grants access to test if a device reference by a data model is online, for example: HTTP GET/POST on /api/data/Ldap/test_connect/.
Type Operation Grants access to model-type-specific custom operations, for example: HTTP POST/PUT/PATCH on /api/data/User/+tag_version/.
Visualize Deprecated.

Create an Access Profile

  1. Choose the hierarchy.
  2. Choose Role Based Access > Access Profile to open the Access Profiles list view.
  3. Click Add on the button bar to open the Access Profiles input form.
  4. Enter a Name and optionally a Description.
  5. Check the Full Access check box to enable full system access to the user, or continue with the steps below to specify the required permissions.
  6. Check the check boxes under Miscellaneous Permissions to set the required miscellaneous permissions. Click Select All to choose all listed Miscellaneous Permissions if required.
  7. Click the '+' icon adjacent to Type Specific Permissions to expand the view.
  8. Choose the required Type permitted by this access profile from the drop-down list. A wild card can be used, for example data/*.
  9. Choose the associated operations that are permitted by this access profile for the permitted type. Click Select All to choose all listed Permitted Operations if required.
  10. Click Save on the button bar to create the Access Profile. The created instance is listed in the Access Profile list view.

The Access Profile can be assigned to a user role from Role Based Access > User Roles.

Access profiles define model types that a user is permitted to access. Access profiles are assigned to users via Roles

Model Details: data/AccessProfile

Title Description Details
Name * The name that is given to the Access Profile.
  • Field Name: name
  • Type: String
Description A description for the Access Profile.
  • Field Name: description
  • Type: String
Full Access Enabling this flag, grants the user full system access.
  • Field Name: full_access
  • Type: Boolean
Miscellaneous Permissions The list of miscellaneous operations permitted by this Access Profile.
  • Field Name: miscellaneous_permissions.[n]
  • Type: Array
Dashboard Permissions
  • Field Name: dashboard_permissions
  • Type: Object
Dashboard Permission Groups The list of dashboard permission groups that are permitted by this Access Profile.
  • Field Name: dashboard_permission_groups.[n]
  • Type: Array
Specific Permissions The list of specific resources permissions that are permitted by this Access Profile.
  • Field Name: specific_permissions.[n]
  • Type: Array
Type Specific Permissions The list of types that are permitted by this Access Profile.
  • Field Name: type_specific_permissions.[n]
  • Type: Array
Permitted Type * The type that is permitted by this Access Profile. This field supports the use of the * wildcard.
  • Field Name: type_specific_permissions.[n].type
  • Type: String
  • Format: uri
Permitted Operations The operations that are permitted by this Access Profile for the given type.
  • Field Name: operations.[n]
  • Type: Array