Skip to main content

FieldLogs

Roles and the Hierarchy

The Roles complement the hierarchy. Together, they define the security authorizations in FieldLogs.

When you create a member, you assign one or more roles to this user. In a role you can add security rules, that are made of a securable object and an access right. These security rules define what the role gives access to.

Roles-SecurableObj.png

Note

If a user has the same security rule in two different roles, these security rules are merged.

For example:

A user has the role Planner. This role contains the following security rules:

  • Web UI - Dashboard, Planning, Tasks, Roles, Security Exceptions, Data

  • Jobs - Read

  • Templates - Read

  • Tasks - All (Read, Write, Assign, Delete)

  • Roles - Read

  • Security Exceptions - All (Read and Delete)

  • Objects - Read

  • Data - Write

This means that a user with the role Planner:

  • Can access the sections and sub-sections Dashboard, Planning, Tasks, Roles, Security Exceptions and Data;

  • Has the authorization to see jobs, templates, roles and objects;

  • Has the authorization to edit data;

  • Has all authorizations on tasks and security exceptions.

For more details about access rights, see the topic Security rules.

What are securable objects?

FieldLogs key internal data structure, graphical elements (such as user interface key elements), or additional functions are securable objects. You can define roles to allow the users to have access and do actions (read, write, exports, etc.) on these securable objects.

Templates, tasks and menu items are examples of securable objects.

You can manage the authorizations on securable objects through the following tabs:

  • Roles, to manage the roles that you will assign to your users,

    Roles are a set of security rules that are grouped together. One or more roles can be assigned to a user.

    For example, the Read access on templates is a security rule. This security rule allows the user to see the templates that are visible to him according to its place in the hierarchy. At a larger level, the authorizations granted by roles are combined with the concept of visibility (see Understanding the hierarchy).

  • Data Bridges, to create an access bridge between two groups or two user sets,

  • Security Exceptions, to create an access right path between a user and a specific content via an authorization request,

  • Identities, to be used in scripts for external API calls.

How does the role interact with the hierarchy?

Here is an example of hierarchy:

Example_Hierarchy_Group_Operations.png

Let's take these two situations:

Situation 1

User

chief_operations@newcorp.com

technician1@newcorp.com

Role

Planner

Field employee

Group

Oil&Gas Operations

Oil&Gas Operations

A template is published in the public template database Operations DB, which is attached to the group Oil&Gas Operations.

chief_operations@newcorp.com assigns this template as a task to technician1@newcorp.com.

technician1@newcorp.com can see and run the task assigned by chief_operations@newcorp.com.

They can see each other and the template published in Operations DB as the two users and the template database are in the same group.

Situation 2

User

chief_contractor@newcorp.com

technician1@newcorp.com

Role

Planner

Field employee

Group

Contractor 1

Oil&Gas Operations

A template is published in the public template database Operations DB, which is attached to the group Oil&Gas Operations.

chief_contractor@newcorp.com cannot assign this template as a task to the user technician1@newcorp.com.

chief_contractor@newcorp.com cannot see technician1@newcorp.com as they are in two separate groups and technician1@newcorp.com is at a higher level in the hierarchy.

Tip

You can exceptionally bypass the hierarchy by creating a security exception, but the user allowing the security exception and the action must be appropriately authorized.

Note

Roles are also used in the conditions, in lifecycles and in the routing table.