<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Security Rule Example: Providing deployment admin role for a user for a specific stream only in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Security-Rule-Example-Providing-deployment-admin-role-for-a-user/ta-p/1717080</link>
    <description>&lt;P&gt;In this scenario, the administrator wants to create a Deployment Admin who has access to a single stream only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;Resolution:&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name: &lt;STRONG&gt;_DeploymentAdminAppAccess-SingleStream&lt;BR /&gt;&lt;/STRONG&gt;Description: Uses resources.stream.name to limit the scope of which apps are visible in the QMC&lt;BR /&gt;Filter: App_*&lt;BR /&gt;Actions: Read + Update&lt;BR /&gt;Conditions: ((user.roles="DeploymentAdmin-single") and (resource.stream.name="Completed Code"))&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;It creates a new user role which is assigned to a given user and statically references a stream name. resource.stream.id is a more robust way of referencing a stream since the GUID does not change while the name can.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name:&lt;STRONG&gt; _DeploymentAdmin&lt;BR /&gt;&lt;/STRONG&gt;Description: Same as the default but with a different user.roles and we removed ReloadTask_* since it needs to be handled separately&lt;BR /&gt;Filter: ServiceCluster_*,ServerNodeConfiguration_*,Engine*,Proxy*,VirtualProxy*,Repository*,Printing*,Scheduler*,User*,CustomProperty*,Tag_*,License*,TermsAcceptance_*,UserSyncTask_*,SchemaEvent_*,CompositeEvent_*&lt;BR /&gt;Actions: Create + Read + Update + Delete&lt;BR /&gt;Conditions: ((user.roles="DeploymentAdmin-single"))&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name: &lt;STRONG&gt;_DeploymentAdminQmcSections&lt;BR /&gt;&lt;/STRONG&gt;Description: Same as the default but with a different user.roles&amp;nbsp;&lt;BR /&gt;Filter: Actions: Read&lt;BR /&gt;Conditions: ((user.roles="DeploymentAdmin-single"))&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name: &lt;STRONG&gt;_DeploymentAdminRulesAccess&lt;BR /&gt;&lt;/STRONG&gt;Description: Same as the default but with a different user.roles&amp;nbsp;&lt;BR /&gt;Filter: SystemRule_*&lt;BR /&gt;Actions: Create + Read + Update + Delete&lt;BR /&gt;Conditions: user.roles = "DeploymentAdmin-single" and (resource.category = "Sync" or resource.category = "License")&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name: &lt;STRONG&gt;_DeploymentAdmin-Reloads&lt;BR /&gt;&lt;/STRONG&gt;Description: Totally new rule where it inherits the ability to interact with tasks based on inheritance from App read rights&lt;BR /&gt;Filter: &amp;nbsp;ReloadTask_*&lt;BR /&gt;Actions: Create + Read + Update + Delete&lt;BR /&gt;Conditions: ((user.roles="DeploymentAdmin-single") and (resource.App.HasPrivilege("read")))&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Notes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This isn't very scalable since it requires a specific role to be created for each stream. There are alternative approaches if you have user meta-data (e.g. user.group) which can be leveraged.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;We in Qlik Support have virtually no scope when it comes to debugging or writing custom security rules for customers. That level of implementation advice needs to be handled by the folks in Professional Services or Presales. That being said, this example is provided for demonstration purposes to explain a specific scenario. No Support or maintenance is implied or provided. Further customization is expected to be necessary and it is the responsibility of the end administrator to test and implement an appropriate rule for their specific use case.&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 09:10:10 GMT</pubDate>
    <dc:creator>Andre_Sostizzo</dc:creator>
    <dc:date>2020-09-29T09:10:10Z</dc:date>
    <item>
      <title>Security Rule Example: Providing deployment admin role for a user for a specific stream only</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Security-Rule-Example-Providing-deployment-admin-role-for-a-user/ta-p/1717080</link>
      <description>&lt;P&gt;In this scenario, the administrator wants to create a Deployment Admin who has access to a single stream only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;STRONG&gt;Resolution:&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name: &lt;STRONG&gt;_DeploymentAdminAppAccess-SingleStream&lt;BR /&gt;&lt;/STRONG&gt;Description: Uses resources.stream.name to limit the scope of which apps are visible in the QMC&lt;BR /&gt;Filter: App_*&lt;BR /&gt;Actions: Read + Update&lt;BR /&gt;Conditions: ((user.roles="DeploymentAdmin-single") and (resource.stream.name="Completed Code"))&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;It creates a new user role which is assigned to a given user and statically references a stream name. resource.stream.id is a more robust way of referencing a stream since the GUID does not change while the name can.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name:&lt;STRONG&gt; _DeploymentAdmin&lt;BR /&gt;&lt;/STRONG&gt;Description: Same as the default but with a different user.roles and we removed ReloadTask_* since it needs to be handled separately&lt;BR /&gt;Filter: ServiceCluster_*,ServerNodeConfiguration_*,Engine*,Proxy*,VirtualProxy*,Repository*,Printing*,Scheduler*,User*,CustomProperty*,Tag_*,License*,TermsAcceptance_*,UserSyncTask_*,SchemaEvent_*,CompositeEvent_*&lt;BR /&gt;Actions: Create + Read + Update + Delete&lt;BR /&gt;Conditions: ((user.roles="DeploymentAdmin-single"))&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name: &lt;STRONG&gt;_DeploymentAdminQmcSections&lt;BR /&gt;&lt;/STRONG&gt;Description: Same as the default but with a different user.roles&amp;nbsp;&lt;BR /&gt;Filter: Actions: Read&lt;BR /&gt;Conditions: ((user.roles="DeploymentAdmin-single"))&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name: &lt;STRONG&gt;_DeploymentAdminRulesAccess&lt;BR /&gt;&lt;/STRONG&gt;Description: Same as the default but with a different user.roles&amp;nbsp;&lt;BR /&gt;Filter: SystemRule_*&lt;BR /&gt;Actions: Create + Read + Update + Delete&lt;BR /&gt;Conditions: user.roles = "DeploymentAdmin-single" and (resource.category = "Sync" or resource.category = "License")&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Name: &lt;STRONG&gt;_DeploymentAdmin-Reloads&lt;BR /&gt;&lt;/STRONG&gt;Description: Totally new rule where it inherits the ability to interact with tasks based on inheritance from App read rights&lt;BR /&gt;Filter: &amp;nbsp;ReloadTask_*&lt;BR /&gt;Actions: Create + Read + Update + Delete&lt;BR /&gt;Conditions: ((user.roles="DeploymentAdmin-single") and (resource.App.HasPrivilege("read")))&lt;BR /&gt;Context: Only in QMC&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Notes:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This isn't very scalable since it requires a specific role to be created for each stream. There are alternative approaches if you have user meta-data (e.g. user.group) which can be leveraged.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;We in Qlik Support have virtually no scope when it comes to debugging or writing custom security rules for customers. That level of implementation advice needs to be handled by the folks in Professional Services or Presales. That being said, this example is provided for demonstration purposes to explain a specific scenario. No Support or maintenance is implied or provided. Further customization is expected to be necessary and it is the responsibility of the end administrator to test and implement an appropriate rule for their specific use case.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:10:10 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Security-Rule-Example-Providing-deployment-admin-role-for-a-user/ta-p/1717080</guid>
      <dc:creator>Andre_Sostizzo</dc:creator>
      <dc:date>2020-09-29T09:10:10Z</dc:date>
    </item>
  </channel>
</rss>

