- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
[Custom Aveksa Entitlements] View a specific application (or directory)
Hi,
I want to create a new Entitlement that allow to a user to view all account of a specific application (Directory), I do not found Secure Object Type=Account with Action=View, so i want create an Entitlement that allow to a user to view all the application or the directory (just view)
For that i create a SecurityContext.csv file with this entry for active directory accounts
SECURE_OBJECT_TYPE,NAME,ACTION,IMPLICIT_HAS_QUERY,IMPLICIT_BS_CHANGE,IMPLICIT_BU_CHANGE,SCOPE_TABLE,SCOPE_FILTER
Directory,View Ad Directory,View,,,,t_applications,lower(name)='active directory'
Note: active directory is a directory not an application.
I grant this entitlement to a user but he can not see the directory, it display Error on Directory name
Can you please explain me how i can create the SecurityContext.csv file
Regards.
- Tags:
- Community Thread
- Discussion
- entitlement
- Forum Thread
- Identity G&L
- Identity Governance & Lifecycle
- IG&L
- IGL
- RSA Identity
- RSA Identity G&L
- RSA Identity Governance & Lifecycle
- RSA Identity Governance and Lifecycle
- RSA IGL
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
I have wrongly suggested to specify scope which caused the entitlement to be scoped to business source and was then getting automatically assigned to users when business source is edited. Please use the below one to achieve what you need (I have removed scope in middle and have changed name as well (there is some issue with creating entitlement of same name that is earlier scoped..))
Users will now get this only when explicitly granted to them.
Directory,View Active Directory,View,,,,t_applications,lower(scope.name)='active directory'
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
The issue here seems to be with how the query gets constructed to fetch directories when there is a security scope. The column name you have used (name) seem to get into conflict... Try changing the line to below
(adidition of scope and name changed to scope.name) and it should work...
(Editing below to correct it)
Directory,View Active Directory,View,,,,t_applications,lower(scope.name)='active directory'
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hi Ramana,
When i upload the file SecurityContext.csv with
SECURE_OBJECT_TYPE,NAME,ACTION,IMPLICIT_HAS_QUERY,IMPLICIT_BS_CHANGE,IMPLICIT_BU_CHANGE,SCOPE_TABLE,SCOPE_FILTER
Directory,View Ad Directory,View,,scope,,t_applications,lower(scope.name)='active directory'
i notice that entitlement are granted to all users and i can not remove it Security Fulfillment Handler Failure
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hi, All the users? I realized now that i have made a mistake with this suggestion. The scope was used wrongly here...
Can you remove the line from SecurityContext file and reupload it from UI. Does that remove the entitlements from the users? If that does not work, can you give me results of below queries to understand how many users have the entitlement..
select * from t_entitlements where action_name = 'View Ad Directory' and RESOURCE_NAME = 'Directory';
select count(*) from t_av_explodeduserentitlements where entitlement_id
in (select id from t_entitlements where action_name = 'View Ad Directory' and RESOURCE_NAME = 'Directory')
and entitlement_type = 'ent' and deletion_date is null;
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hi,
I deleted the SecurityContext.csv file using ui, but the entitlement still in the users
The entitlement are granted for all used users
Regards.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Please use below query to forcefully delete that entitlement from users.. PLEASE MAKE SURE that this only updates 12 rows (as returned by your previous query) before you make a commit.
update t_av_explodeduserentitlements set deletion_date = sysdate where entitlement_id
in (select id from t_entitlements where action_name = 'View Ad Directory' and RESOURCE_NAME = 'Directory')
and entitlement_type = 'ent' and deletion_date is null;
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
I have wrongly suggested to specify scope which caused the entitlement to be scoped to business source and was then getting automatically assigned to users when business source is edited. Please use the below one to achieve what you need (I have removed scope in middle and have changed name as well (there is some issue with creating entitlement of same name that is earlier scoped..))
Users will now get this only when explicitly granted to them.
Directory,View Active Directory,View,,,,t_applications,lower(scope.name)='active directory'
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
thank you Ramana, it works for me
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hi Venkat,
Would you please let me know what scope_table & scope_filter can be used to customize access to:
1. Reports based on names, scope and filter conditions
2. Reviews based on their names & business source
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Please check below videos on how to use the custom security entitlements...
