Version

    Groups

    CloverDX uses Role-Based Access Control (RBAC) to manage permissions for its users. The system allows admin to assign permissions to various roles (called groups) and then assign those roles to users (where each user can have multiple roles).

    Group is therefore a basic unit which allows admin to define permissions for certain users in a simple way. This approach allows even very complex permissions setup and scales very well to large number of users.

    Permissions apply on multiple levels:

    • Sandbox level permissions: Read/Write/Execute permissions for sandboxes influence access to sandboxes for different users. For details, see Sandbox content security and permissions.

    • Operation/action permissions: allow/disallow users to perform certain actions via user interface or API. These are configured as specific permissions assigned to user roles (groups) in the Groups module.

    • Data Services permissions*: permissions to launch specific service. For details, see Data Services.

    To help CloverDX administrators in common scenarios, several groups are created by default.

    Table 28. Default groups created during installation
    Group name Description

    Administrator

    Members of the Administrator group have complete and unrestricted access to CloverDX Server. By default, this group includes clover system user.

    All users

    This legacy group was intended to include all users; however, the assignment must be maintained by server administrator manually. If you need to handle all users, use the Everyone group instead. It is possible to remove users from this group, but it is not recommended. This group is useful mainly to simplify management of permissions to various sandboxes or other features which you may want to make available to all users.

    Data App users

    Members of the Data App users group have very limited permissions and can only access Data Apps user interface.

    Data Manager administrator

    Members of the Data Manager administrator group have access to Data Manager user interface and administration. Membership in this group does not grant access to CloverDX Server Console.

    Data Manager users

    Members of the Data Manager users group have access to Data Manager user interface. Membership in this group does not grant access to CloverDX Server Console.

    Everyone

    A special group with auto-managed membership - it always includes all users, and users cannot be removed from this group. Once installed, the group cannot be deleted or renamed. By default, it has no permissions. It can be used to set the default permissions that apply to everyone.

    Job developer

    Members of the Job developer group have broad access to CloverDX Server. The group is aimed at non-production environments and is designed for users who need to develop and test CloverDX solutions.

    L1 support

    Members of the L1 support group have limited access to CloverDX Server. The group is aimed at operators who help with basic Server maintenance – monitoring jobs, rerunning them, investigating production issues and so on.

    L2 support

    Members of the L2 support group have broad access permissions to CloverDX Server and can change many of its settings. The group is targeted at technical operators of the Server who need to solve various issues or who need to deploy new versions of code to the Server.

    QA engineer

    Members of the QA engineer group have broad access to CloverDX Server. The group is aimed at non-production environments and is designed for users who need to develop and test CloverDX solutions.

    Read-only users

    Members of the Read-only users group have very limited permissions. The group applies to users who need to monitor job execution on the Server or who want to see how the jobs work via Job Inspector.

    Wrangler administrator

    Members of the Wrangler administrator group have access to Wrangler user interface and can manage the shared workspace. Membership in this group does not grant access to CloverDX Server Console.

    Wrangler

    Members of the Wrangler group have access to Wrangler user interface and can create and run Wrangler jobs. Membership in this group does not grant access to CloverDX Server Console.

    Note that you may not have all these groups available on your system. You may have deleted some of them in the past or some of the groups may not have been created on your system depending on how you installed your CloverDX Server (e.g., certain groups are only created on new instances and are not created during upgrades).

    Users assignment

    Each user can belong to any number of groups, and each group can contain any number of users (i.e., this is typical N:M relationship).

    Any change in user assignment to groups will automatically log out the affected users from all their active sessions and force them to log in again.
    Group permissions

    Group permissions are structured as a tree, where permissions are inherited from the root to leaves.

    This means that if a node is enabled (blue dot), all permissions in its subtree are enabled as well. This means that more powerful permissions are nearer to the root of the permissions tree and more granular (less powerful) permissions are the leaves.

    As an example, admin user that gets access to everything only needs one permission assigned - the top-level All permission that is the root of all permissions in the system. This will automatically assign all child permissions.

    Any change in group permissions will automatically log out all users assigned to the affected group from all their active sessions and force them to log in again.

    The following section describes what different permissions mean:

    • All permissions

      The user with this permission has all available permissions. The Admin group has all permissions by default.

    • Data Manager

      Permissions related to the CloverDX Data Manager. For more information on these permissions, refer here.

      • Manage Data Sets in Server Console

        Allows the user to view and manage data sets within the CloverDX Server Console in Transactional Data Sets and Reference Data Sets modules without requiring full Data Manager access. Note that users logged into the CloverDX Server Console on remote servers can only view data sets but cannot manage them.

        • View data sets in Server Console

          Allows the user to monitor data sets in the CloverDX Server Console in Transactional Data Sets and Reference Data Sets modules, but it does not allow the user to enable or disable data sets.

      • Unlimited access to all data sets

        Allows the user to fully manage data sets within the Data Manager or using the Data Manager API. User can create, modify, and delete any data set, acting as data set administrator.

        • Create new data sets

          Allows the user to create new data sets within the Data Manager or using the Data Manager API.

      • Access to Data Manager UI

        Gives the user ability to log in to the Data Manager. This permission will require a Data Manager seat (see Data Manager licensing for more details).

    • Tasks history

      Allows the user to access the Tasks history section, see Tasks.

    • Monitoring full access

      Grants the user all its sub-permissions.

      • Monitoring UI

        Allows the user to access the Monitoring section. For the Operations Dashboard, the List dashboards and monitors permission is also required.

        See Monitoring.

      • Operations dashboard write access

        Allows the user to create, edit and delete dashboards and monitors.

        • Mark issues as resolved

          Allows the user to reset error state on triggers and monitors.

        • List dashboards and monitors

          Allows the user to see dashboards and monitors via API and UI.

      • Suspend

        Allows the user to suspend the server, a Cluster node, or a sandbox.

        The user must have the Monitoring UI permission to access the Monitoring section.

        • Suspend server

          Allows the user to suspend or resume the server.

          The user must have the Monitoring UI permission to access the Monitoring section.

        • Suspend Cluster node

          Allows the user to suspend or resume a Cluster node.

          The user must have the Monitoring UI permission to access the Monitoring section.

        • Suspend sandbox

          Allows the user to suspend a sandbox. The user must have List sandbox permission to view the sandboxes to suspend them.

          See also Sandboxes.

      • Reset caches

        Deprecated.

      • Running jobs unlimited

        User must also have the List sandbox permission to be able to run jobs from the Server Console.

        • Running jobs limited

          User must also have the List sandbox permission to be able to run jobs from the Server Console.

    • Configuration

      Allows the user to access the configuration section.

      • Users

        This permission allow user to access the Users section and configure user accounts.

        • List user

          Allows the user to list users and access to the Users administration section (Configuration  Users)

        • Change passwords

          Allows the user to change his password and to change password of another user.

          To see list of users, the user needs the List user permission.

        • Edit user

          Allows the user to change group assignment and edit other properties of a user account.

          To see the list of users, the user must have the List user_ permission.

          • Edit own profile and password

            Allows the user to change their profile (first name, last name, email, and password).

            The user can access their profile in Server Console via the "person" icon in the upper right corner of the page. See user profile for more information.

        • Unlock user

          Allows the user to unlock a user.

          The user must have the List user permission to list available users.

        • Delete user

          Allows the user to disable a user.

          The user must have the List user permission to list available users.

        • Create user

          Allows the user to create a new user.

          User must also have the List user permission to be able to create new users in Server Console.

        • Groups assignment

          Allows the user to assign users to groups.

          The user must have the Edit user permission to be able to change the assignment of users to groups.

          User must have the List user_ permission to be able to create other users in Server Console.

      • Groups

        Allows the user to manage groups: list groups, create groups, delete groups, edit groups, assign users to groups, and change group permissions.

        • List groups

          Allows the user to list groups. This permission is necessary for use of other options from the Groups group.

        • Create group

          Allows the user to create a new user group.

          User must have the List groups permission to create new groups in Server Console.

        • Delete group

          Allows the user to delete a user group.

          Only empty groups can be deleted. User must have the List groups permission to be able to delete groups in Server Console.

        • Edit group

          This permission allow user to edit user groups.

          This permission does not include User assignment and Permission assignment.

          TO edit groups via Server Console, the user must have the List groups permission.

        • Users assignment

          Allows the user to assign users to groups.

          The user also needs Edit group permission and List groups permission to change user assignment via Server Console.

        • Permission assignment

          Allows the user to configure group Permissions.

          The user also needs have the Edit group permission and List groups permission to change user permissions via Server Console.

      • Secure parameters administration

        • Secure params

          Allows the user to change the value of a secure parameter.

          The user can use secure parameters in graphs even without this permission.

      • Unlimited access to Secret Managers

        Allows the user to create, edit and delete Secret Managers.

      • CloverDX/System info sections

        Allows the user to view System Info and CloverDX Info sections.

      • CloverDX Server properties

        Allows the user to view Server Properties tab in CloverDX Info section.

        The user must have the CloverDX/System info sections permission to access CloverDX Info section.

      • Reload license

        Allows the user to view and reload the Server license.

        The user must have the CloverDX/System info sections permission to access the Configuration section.

      • Upload license

        Allows the user to update the Server license.

        The user must have the CloverDX/System info sections permission to access the Configuration section.

        See Activation.

      • Server configuration management

        Allows the user to import and export the server configuration.

      • Temp space management

        Allows the user to access Temp Space Management section.

      • Server setup

        Allows the user to access the server setup.

        See Setup.

      • Heap memory dump

        Allows the user to create a Thread dump and a Heap Memory Dump.

    • Open Server Console

      Allows the user to log into the Server Console.

    • Wrangler

      Main permission for the Wrangler. Users with this permission will have full access to Wrangler user interface and will be able to manage Wrangler workspaces.

      • Access to the Wrangler UI

        Allows user to login to Wrangler app.

        Users with this permission will require Wrangler seat (the seat will be automatically "consumed" once they login to Wrangler for the first time). Users with this permission cannot manage shared workspace in Wrangler, but they can access it provided Wrangler workspace admin gave them permission to access the workspace.

      • Shared workspace administrator

        Allows user to manage permission of Wrangler’s shared workspace via Wrangler app.

        Users with this permission also require Access to the Wrangler UI permission and therefore will consume one Wrangler seat once they login at least once.