Your Browser is not longer supported

Please use Google Chrome, Mozilla Firefox or Microsoft Edge to view the page correctly
Loading...

{{viewport.spaceProperty.prod}}

Roles

&pagelevel(3)&pagelevel

In WebAdmin roles are represented as "normal" UTM objects, for example as Ksets. However, the role objects are known only to WebAdmin and are not communicated to the UTM administration interface since openUTM is still only able to use lockcodes and keycodes.

The main purpose of the role objects is to link the less transparent numerical lockcodes and keycodes with user-definable symbolic names. The "name" of a role object corresponds to the lockcode/keycode that is passed to openUTM. The "Alias" property of the role objects specifies the symbolic name of the role, for example "department manager" or "clerk", and can be edited as required. Wherever roles are displayed in WebAdmin, for example in object lists and property pages, the alias of the role is specified instead of the name.

In the case of roles, it is possible to distinguish between user roles (represented by Ksets) and access roles (represented by locks and access lists).
The table below provides an overview of the security-relevant UTM object types and generation parameters:

Object
Type

Type

Generation
parameter

Role type

USER



User

KSET

User roles

Service
(queue)


Q-READ-ACL

Access roles (read access to the user queue)

Q-WRITE-ACL

Access roles (write access to the user queue)

LTERM


Coupler


LOCK

Access role

KSET

User roles

TPOOL



Coupler



LOCK

Access role

KSET

User roles (of the Tpool and an implicit user if no USER-KSET is present)

USER-KSET

User roles (of an implicit user)

LPAP

Coupler

KSET

User roles

OSI-LPAP


Coupler


KSET

User roles (of the Osi-Lpap and an implicit user if no ASS-KSET is present)

ASS-KSET

User roles (of an implicit user)

TAC




Service


LOCK

Access role (access to an asynchronous or dialog Tac)

ACCESS-LIST

Access roles (access to an asynchronous or dialog Tac)

Service
(queue)


Q-READ-ACL

Access roles (read access to the Tac queue)

Q-WRITE-ACL

Access roles (write access to the Tac queue)

LTAC


Service


LOCK

Access role

ACCESS-LIST

Access roles