Enabling groups of users

You manage users and groups from the Administration tab of the Business console or using an Ant task.

Note: The examples provided in this section assume that you have configured your application server to delegate authorization to Decision Center.

Decision Center uses groups for fine-grained security access to the different branches (decision services, releases, and activities) and permissions on the different types of rule artifacts (see Security). To make use of this security and permissions feature, you must create groups in the Decision Center database, and assign all users to one or more of these groups.

To manage groups of users, consider the following:
Decision Center Groups
You create in Decision Center as many groups as you need to organize your users functionally. When you create or import a group, you must map the group to a role, and then place users in the groups. It is not possible to map a user to a role directly.
UI Roles
A role determines what portions of the Decision Center UI are available to a user. Decision Center has the following predefined roles:
Role Use
rtsAdministrator Administrator access.
rtsInstaller Access to the Installation Settings Wizard in the Enterprise console.
rtsConfigManager Configuration manager access.
rtsUser Standard access.
Typical management of groups of users can be as follows:
  • For the initial configuration of Decision Center, choose a group in your LDAP or create a group for administrators and installers, for example AdminGroup and InstallGroup. Map these groups to the roles rtsAdministrator and rtsInstaller, and place all administrator users as members of both these groups.
  • After the initial configuration, create or import new groups, map these groups to the rtsUser role, and place users in the new groups. When you import groups from an LDAP, an equivalent Decision Center group is created.

The following image shows how roles, groups, and users interact:

Interaction between roles, groups, and users in Decision Center

In the above diagram:
  • The bottom of the diagram shows that you declare, in the Decision Center database, the users present in your user registry.
  • The middle of the diagram shows that all users must be members of one or more Decision Center groups. You create these Decision Center groups yourself, either manually or by importing them from an LDAP. You name these groups according to their functional relationship in Decision Center, or according to how they are grouped in the registry. If you are using an LDAP, you can connect to the LDAP from Decision Center to facilitate importing of groups and users.
  • The top part of the diagram shows how you map each Decision Center group to one of the predefined roles. You can also create new roles but this requires an equivalent customization of the Decision Center UI.
Note: New users must be able to authenticate. Make sure that any users that you add to the Decision Center database are also available in the authentication registry (see Declaring users in the Decision Center database.)

Permission profiles

In Decision Center, security defines which groups have access to the different branches of a decision service (see Security).

With security implemented, you must specify, for each Decision Center group that can access the branch, what permissions they have to view, create, update, and delete which types of artifacts.

In the Business console, you can assign one of the following simplified permission profiles to the different Decision Center groups:
None
Groups assigned this permission profile have access to the branch, but cannot see its content.
Read Only
Groups assigned this permission profile can view the contents of the branch, but cannot create, update, or delete content.
Full Authoring
Groups assigned this permission profile can view, create, update, or delete all content in the branch.
Custom
Assigning this permission profile requires you to use the Enterprise console to manually create a permissions table for that group (see Permissions.)

The permission profile that you assign in the Business console is automatically switched to Custom if you make changes to the permission table in the Enterprise console.