/
Roles / Permissions / Security

Roles / Permissions / Security

As part of the migration process for an existing application to the new setup interfaces, there are two possibilities that we might consider if you want to administrate the users’ roles in that interface.

 

  • You already use the logic of permissions via PACKAGED_Security
    In that case, you won’t have to do anything.

  • You are not yet using the logic of permissions
    If the decision is made to retain the legacy security rules, it is important to note that the associated roles will not be able to be administrated in the setup interface.

    Otherwise, you will have to do the following steps :

    • Get the packaged rules “Default rule” and “Developer” for each security domain and action from the engine’s NAR

    • Attach each role to the corresponding role template that best suits the role type

    • Translate the legacy security rule into the new system of permissions

    • Configure the correct family (instances of objectfamily) of lists objects (closed, opened, …)

    • Add the required tags on structures that are identified to be handled by the new security logic (see Structures / Data Model | Important structures notes )

 

 

Related Documentation pages :

Related content