Managing User Roles¶
Roles contain permissions for users to manage the server. They can be reused and they eliminate the overhead of granting permissions to users individually.
The following roles that are typically used in many enterprises are used throughout this documentation. You can also define different user roles depending on your requirements.
- admin: The API management provider who hosts and manages the API Gateway and is responsible for creating users in the system, assigning them roles, managing databases, security, etc. The Admin role is also used to access the ESB Admin Portal (
https://<APIM_Host>:<APIM_Port>/admin
), where you can define workflow tasks, throttling policies, analytics configurations, etc. The Admin role is available by default with the credentials admin/admin. By default, this role contains all the permissions (including super admin permissions) in the permission tree. - creator: A creator is typically a person in a technical role who understands the technical aspects of the API (interfaces, documentation, versions, etc.) and uses the API publisher to provision APIs into the Developer Portal. The creator uses the Developer Portal to consult ratings and feedback provided by API users. The creator can add APIs to the Developer Portal but cannot manage their lifecycle. Governance permission gives a creator permission to govern, manage, and configure the API artifacts.
- publisher: A person in a managerial role and overlooks a set of APIs across the enterprise and controls the API lifecycle, subscriptions, and monetization aspects. The publisher is also interested in usage patterns for APIs and has access to all API statistics.
- subscriber: Users or Application Developers who search the Developer Portal to discover APIs and use them. They read the documentation and forums, rates/comments on the APIs, subscribes to APIs, obtain access tokens, and invokes the APIs.
Follow the instructions below to create the creator
, publisher
, and subscriber
roles in the ESB for sample purposes.
Creating user roles¶
- Sign in to the management console (
https://<APIM_Host>:<APIM_Port>/carbon
) as the admin (default credentials are admin/admin). -
Click Main, and then click Add under Users and Roles.
-
Click Add New Role.
-
Enter the name of the user role (e.g.,
creator
).In the Domain list, specify the user store where you want to create this role. This list includes the primary user store and any other secondary user stores that are configured for your product. For information on how user stores (which are repositories storing information about users and roles) are set up and configured, see Configuring User Stores. Enter a unique name for this role (
creator
) and click Finish.Tip
The Domain drop-down list contains all user stores configured in the system. By default, only the PRIMARY user store is configured. To configure secondary user stores, see Configuring Secondary User Stores.
Warning
In MWARE ESB, Developer Portal and Publisher Web Application UIs are populated by API-M REST APIs and all the authentication and authorization to access the different components in the UI solely depend on the scope role mapping defined in
/_system/config/apimgt/applicationdata/tenant-conf.json
that can be accessed through the Management Console from Resources > Browse.By default, the scope-role mapping contains
Internal/creator
,Internal/publisher
,Internal/subscriber
,Internal/analytics
, andInternal/devops
as the default roles. If there are custom roles defined with API creator, API publisher, admin and API subscriber permissions, those roles have to be configured in thetenant-conf.json
file under the relevant scopes.
Info
For more information on role mapping or scope mapping, see Adding role permissions
Application Roles
When a user creates an application and generates application keys, a role is created automatically in the following format.
"Application/<username>_<applicationUUID>_PRODUCTION"
This is a special case of the internal
role that is created for a particular service provider application. Only users who are assigned the application role permission can manage the corresponding service provider application.
These roles do not have any permissions assigned to it, but it is used to manage the visibility of the corresponding service provider that is created in the format of '<username>_<applicationUUID>_PRODUCTION'
within the Key Manager. The created service provider is only visible to users with the latter mentioned role that has been generated automatically. Only if a user with admin privileges assigns the latter mentioned role to a user, will that user be able to view the details of the service provider that is created per application.
Warning
As a limitation, when you delete a user and create another with the same username, applications of the previous user will be visible on the Developer Portal applications listing page. However the new user will not be able to access the details of the application as the service provider is already deleted.
Adding Scope Assignments¶
You can use scope assignments to map the above created roles to the existing default internal roles of API-M or assign custom scopes to them. This enables users with new roles to use REST API scopes of API-M Portals easily.
-
Sign in to the Admin Portal (
https://<APIM_Host>:<APIM_Port>/admin
) if you have not done so already. -
Navigate to Settings > Scope Assignments in Admin Portal and click on Add scope mappings.
-
Provide the name of the newly created role.
-
The newly created role can be mapped to an existing internal or admin role if required.
-
Select the required existing scopes for the newly created role and save the changes.
This will update all the scope mappings in the tenant-conf.json
file with the Internal/creator
role as an allowed role. As a result, the new creator role will also be allowed for all scopes that are allowed for the Internal/creator
role.
Info
The following are the scopes that are allowed for each default Internal role under the default configurations section.
Scope | admin | Internal/publisher | Internal/creator | Internal/subscriber | Internal/analytics | Internal/everyone |
---|---|---|---|---|---|---|
apim:api_publish | ✓ | ✓ | ||||
apim:api_create | ✓ | ✓ | ||||
apim:api_view | ✓ | ✓ | ✓ | ✓ | ||
apim:api_delete | ✓ | ✓ | ||||
apim:subscribe | ✓ | ✓ | ||||
apim:tier_view | ✓ | ✓ | ✓ | |||
apim:tier_manage | ✓ | |||||
apim:bl_view | ✓ | |||||
apim:subscription_view | ✓ | ✓ | ✓ | |||
apim:subscription_block | ✓ | ✓ | ||||
apim:mediation_policy_view | ✓ | ✓ | ||||
apim:mediation_policy_create | ✓ | ✓ | ||||
apim:api_workflow | ✓ | |||||
apim:app_owner_change | ✓ | |||||
apim:app_import_export | ✓ | |||||
apim:api_import_export | ✓ | |||||
apim:label_manage | ✓ | |||||
apim:label_read | ✓ | |||||
apim:app_update | ✓ | ✓ | ||||
apim:app_manage | ✓ | ✓ | ||||
apim:sub_manage | ✓ | ✓ | ||||
apim:monetization_usage_publish | ✓ | ✓ | ||||
apim:document_create | ✓ | ✓ | ✓ | |||
apim:ep_certificates_update | ✓ | ✓ | ||||
apim:client_certificates_update | ✓ | ✓ | ||||
apim:threat_protection_policy_manage | ✓ | ✓ | ||||
apim:document_manage | ✓ | ✓ | ✓ | |||
apim:client_certificates_add | ✓ | ✓ | ||||
apim:publisher_settings | ✓ | ✓ | ✓ | |||
apim:store_settings | ✓ | ✓ | ||||
apim:client_certificates_view | ✓ | ✓ | ||||
apim:mediation_policy_manage | ✓ | ✓ | ||||
apim:threat_protection_policy_create | ✓ | ✓ | ||||
apim:ep_certificates_add | ✓ | ✓ | ||||
apim:ep_certificates_view | ✓ | ✓ | ||||
apim:api_key | ✓ | ✓ | ||||
apim_analytics:admin | ✓ | |||||
apim_analytics:api_analytics:own | ✓ | |||||
apim_analytics:api_analytics:edit | ✓ | |||||
apim_analytics:api_analytics:view | ✓ | ✓ | ✓ | |||
apim_analytics:application_analytics:own | ✓ | |||||
apim_analytics:application_analytics:edit | ✓ | |||||
apim_analytics:application_analytics:view | ✓ | ✓ | ||||
apim_analytics:monitoring_dashboard:own | ✓ | |||||
apim_analytics:monitoring_dashboard:edit | ✓ | |||||
apim_analytics:monitoring_dashboard:view | ✓ | ✓ | ||||
apim_analytics:business_analytics:own | ✓ | |||||
apim_analytics:business_analytics:edit | ✓ | |||||
apim_analytics:business_analytics:view | ✓ | ✓ | ||||
apim:pub_alert_manage | ✓ | ✓ | ||||
apim:sub_alert_manage | ✓ | ✓ | ||||
apim:tenantInfo | ✓ | |||||
apim:admin_operations | ✓ | |||||
apim:shared_scope_manage | ✓ |
Editing or deleting a role¶
-
Sign in to the management console (
https://<APIM_Host>:<APIM_Port>/carbon
) if you have not done so already. -
In the Main menu, click List under Users and Roles.
-
Click Roles.
-
If you need to modify to a role, select the domain (user store) under Search Roles > Select Domain where the role resides.
Then use the relevant links in the Actions column that corresponds to the role listing to perform the following:
- Rename the role
- Change the default permissions associated with this role
- Assign this role to users
- View the users who are assigned this role
- Delete the role if you no longer need it
Info
If the role is in an external user store to which you are connected in read-only mode, you will be able to view the existing roles but not edit or delete them. However, you can still create new editable roles.
Updating before the first startup (recommended)¶
The default role name of the Administrator, (admin
) can be changed before starting MWARE ESB by editing <API-M_HOME>/repository/conf/deployment.toml
file. For more information, see Change the super admin credentials.
Configure the property admin_role
with your custom role (administrator
) in the deployment.toml
file as follows and start the server.
[super_admin]
admin_role = "administrator"
username = "admin"
password = "admin"
create_admin_account = true
Updating the role name after the product is used for some time (advanced configuration)¶
Tip
These steps are not necessary if you have already updated the role names before the first startup of the product.
The following steps guide you through updating the role names after you have used the product for some time.
-
Make the configuration changes indicated in the above section.
-
Do the following user store level changes for existing users:
If you are connected to the
JDBCUserStoreManager
, update theUM_ROLE
table with the new role name that you defined in place of theadmin
role.Info
The schema can be located by referring to the data source
[database.shared_db]
defined in thedeployment.toml
file. The data source definition can also be found in the same file.- If you are connected to the
ReadWriteLdapUserStoreManager
, populate the members of the previousadmin
role to the new role under Groups. For more information, see Configuring User Stores.
- If you are connected to the
-
Restart the server.