{"id":460,"date":"2014-08-18T18:30:27","date_gmt":"2014-08-18T18:30:27","guid":{"rendered":"https:\/\/ephesoft.com\/docs\/?p=460"},"modified":"2020-12-03T14:51:14","modified_gmt":"2020-12-03T21:51:14","slug":"how-to-administer-ephesoft-users-groups","status":"publish","type":"docs","link":"https:\/\/ephesoft.com\/docs\/products\/transact\/configurations\/user-connectivity\/how-to-administer-ephesoft-users-groups\/","title":{"rendered":"How to Administer Ephesoft Users and Groups"},"content":{"rendered":"
Ephesoft supports Tomcat, OpenLDAP and Microsoft Active Directory protocols for maintain a roster of users and groups. OpenLDAP is the default management system that is enabled and configured following a clean installation of Ephesoft Transact. There are two main configuration files:<\/p>\n
This file contains the settings necassary to populate groups names in Ephesoft Batch Class Management. The file contains settings for LDAP, Tomcat and MS Active Directory.<\/p>\n
This file tells Ephesoft how users should be authenticated when they are login into the Ephesoft. The file should have following Realm:<\/p>\n
Apache-Tomcat configuration is enabled in three different files:<\/p>\n
This file contains the settings necassary to populate groups names in Ephesoft Batch Class Management. The following settings should be set for Tomcat:<\/p>\n
user.tomcatUserXmlPath={EPHESOFT_ROOT_DIR}\\\\JavaAppServer\\\\conf\\\\tomcat-users.xml\r\nuser.connection=2\r\n<\/pre>\n
This file tells Ephesoft that users should be authenticated using tomcat. The file should have following Realm:<\/p>\n
<Realm className=\"org.apache.catalina.realm.MemoryRealm\"\/> \r\n<\/pre>\n
This file contains user groups and users. For example a group called admin and a user called ephesoft with password demo is defined as follows:<\/p>\n
<role rolename=\"admin\"\/>\r\n <user username=\"ephesoft\" password=\"demo\" roles=\"admin\"\/>\r\n<\/pre>\nConfiguring OpenLDAP<\/span><\/h3>\n
OpenLDAP Software is a free, open source implementation of the Lightweight Directory Access Protocol (LDAP) developed by the OpenLDAP Project. It is released under its own BSD-style license called the OpenLDAP Public License. LDAP is a platform-independent protocol. To connect to the Ephesoft LDAP database and modify groups, users, permissions, etc administrators can utilize the bundled JExplorer tool @ the following location:<\/p>\n
\n
- {EPHESOFT_ROOT_DIR}\\Dependencies\\OpenLDAP\\ldap-client\\jxplorer-3.2.1\\jxplorer.bat<\/li>\n<\/ul>\n
Connection to LDAP configuration is enabled in two different files:<\/p>\n
\n
- {EPHESOFT_ROOT_DIR}\\Application\\WEB-INF\\classes\\META-INF\\dcma-user-connectivity\\user-connectivity.properties<\/li>\n<\/ul>\n
This file contains the settings necassary to populate groups names in Ephesoft Batch Class Management. The following settings should be set for LDAP configuration:<\/p>\n
user.ldap_url=ldap:\/\/localhost:389\r\nuser.ldap_config=com.sun.jndi.ldap.LdapCtxFactory\r\nuser.ldap_domain_component_name=ephesoft\r\nuser.ldap_domain_component_organization=com\r\nuser.ldap_username=cn=Manager,dc=ephesoft,dc=com\r\nuser.ldap_password=*******\r\nuser.connection=0\r\n<\/pre>\n\n
- {EPHESOFT_ROOT_DIR}\\JavaAppServer\\conf\\server.xml\n
\n
- \n
\n
- NOTE: IN EPHESOFT v2.5 Realm settings are located in {EPHESOFT_ROOT_DIR}\\JavaAppServer\\conf\\Catalina\\localhost\\dcma.xml INSTEAD OF server.xml<\/b><\/dd>\n<\/dl>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n
This file tells Ephesoft that users should be authenticated using tomcat. The file should have following Realm:<\/p>\n
<Realm className=\"org.apache.catalina.realm.JNDIRealm\"\r\nconnectionURL=\"ldap:\/\/localhost:389\"\r\nconnectionName=\"cn=Manager,dc=ephesoft,dc=com\"\r\nconnectionPassword=\"secret\"\r\nuserPattern=\"cn={0},ou=people,dc=ephesoft,dc=com\"\r\nroleBase=\"ou=groups,dc=ephesoft,dc=com\"\r\nroleName=\"cn\"\r\nroleSearch=\"uniqueMember={0}\"\r\n\/><\/pre>\nConfiguring Active Directory<\/span><\/h3>\n
Update – Configuring Active Directory Globally (Applies to v3.0 or Higher)<\/span><\/h4>\n
Requirement:\u00a0Latest dcma-user-connectivity-0.0.15.jar<\/i>\u00a0[5]<\/a><\/p>\n
Objective:<\/p>\n
\n
- \n
\n
- Using root domain(Domain components DC only) as user base and role base for authentication using LDAP\/MS Active directory.<\/li>\n
- Possibly having a single and convenient realm to handle all requests.<\/li>\n<\/ul>\n<\/dd>\n<\/dl>\n
Proposed Solution:<\/p>\n
\n
- \n
\n
- Enhancing LDAP and MS Active directory to be able to provide authentication having the knowledge of root domain only.<\/li>\n
- Setting up the realm for providing the same.<\/li>\n
- Updating jars to handle this scenario.<\/li>\n<\/ul>\n<\/dd>\n<\/dl>\n
Solution:<\/p>\n
\n
- \n
\n
- MS Active directory<\/li>\n
- MS Active Directory works on various ports for different purposes.<\/li>\n
- Port\u00a0389<\/b>\u00a0is for normal LDAP working of MS Active Directory.<\/li>\n
- Port\u00a03268<\/b>\u00a0is for Global catalog working of MS Active Directory.<\/li>\n
- MS Active directory working as simple LDAP service cannot handle root domain search requests. This is Because Searching a root domain in Active directory returns referrals to the root components which can only be handled by Global catalog service and not by normal LDAP service.<\/li>\n<\/ul>\n<\/dd>\n<\/dl>\n
To do this you will modify the user-connectivity.properties file located in:<\/p>\n
Epehesoft Install Directory\\Application\\WEB-INF\\classes\\META-INF\\dcma-user-connectivity<\/i><\/p>\n
\n
- \n
\n
- Set the \u201cuser.msactivedirectory_url\u201d to \u201cldap:\/\/<Server-Name\/IP>:3268<\/b>\u201d<\/li>\n
- Set the \u201cuser.msactivedirectory_context_path\u201d to empty<\/li>\n
- Set the \u201cuser.msactivedirectory_group_search_filter\u201d to a single filter value. (Not multiple filters to be specified)<\/li>\n<\/ul>\n<\/dd>\n<\/dl>\n
This setting will be in sync with the one done while setting the Realm.<\/p>\n
Setting changes to LDAP<\/b><\/p>\n
Normal LDAP service allows us to search on root domain without any further configuration. So there is not much change to be made in order to make LDAP work with root domain chosen as base. Following are the changes:<\/p>\n
\n
- \n
\n
- Set the \u201cuser.ldap_user_base\u201d to empty.<\/li>\n
- Set the \u201cuser.ldap_group_base\u201d to empty.<\/li>\n<\/ul>\n<\/dd>\n<\/dl>\n
**Note**: these properties are added in the Installer version 3.0.2.0 onwards. Please update your properties file with the Changes mentioned if running versions prior to 3.0.2.0.<\/b><\/p>\n
Sample Configuration for User-connectivity.properties file:<\/b><\/p>\n
user.ldap_url=ldap:\/\/localhost:389\r\n user.ldap_config=com.sun.jndi.ldap.LdapCtxFactory\r\n user.ldap_domain_component_name=ephesoft\r\n user.ldap_domain_component_organization=com\r\n user.ldap_username=cn=Manager,dc=ephesoft,dc=com\r\n user.ldap_password=secret\r\n user.ldap_user_base=\r\n user.ldap_group_base=\r\n user.msactivedirectory_url=ldap:\/\/msad.ephesoft.com:3268\r\n user.msactivedirectory_config=com.sun.jndi.ldap.LdapCtxFactory\r\n user.msactivedirectory_context_path=\r\n user.msactivedirectory_domain_component_name=ephesoft\r\n user.msactivedirectory_domain_component_organization=com\r\n user.msactivedirectory_user_name=CN=administrator,DC=ephesoft,DC=com\r\n user.msactivedirectory_password=Passw0rd\r\n # filter can have |(OR), &(AND) and\u00a0!(NOT)\r\n # | (|(cn=a*))\r\n # & (&(cn=a*))\r\n #\u00a0! (!(cn=a*))\r\n # complex example ((!(cn=a*))(|(cn=ephesoft*)(&(cn=b*)))\r\n user.msactivedirectory_group_search_filter=(!(cn=*h*oft*))\r\n user.tomcatUserXmlPath=C:\\\\Ephesoft\\\\JavaAppServer\/conf\/tomcat-users.xml\r\n # 0 for LDAP\r\n # 1 for MS Active Directory\r\n # 2 for Tomcat\r\n user.connection=1\r\n<\/pre>\nNext you will need to modify the Realm settings in the Server.XML file located in:<\/p>\n
Epehesoft Install Directory\\JavaAppServer\\conf<\/i><\/p>\n
<Realm className=\"org.apache.catalina.realm.JNDIRealm\"\r\n connectionURL=\"ldap:\/\/<Server-Name\/IP>:3268\"\r\n connectionName=\"<Authenticated-User-Name>\"\r\n connectionPassword=\"<Authenticated-User-Password>\"\r\n userBase=\"<Any Chosen User Base>\"\r\n userSearch=\"<Unique Parameter for user search Suggested: (sAMAccountName={0})>\"\r\n userSubtree=\"true\"\r\n referrals=\"follow\"\r\n roleBase=\"<Any Chosen User Base>\"\r\n roleName=\"cn\"\r\n roleSubtree=\"true\"\r\n roleSearch=\"(member={0})\"\r\n \r\n \/>\r\n<\/pre>\nExample Realm Configuration:<\/p>\n
<Realm className=\"org.apache.catalina.realm.JNDIRealm\"\r\n connectionURL=\"ldap:\/\/msad.ephesoft.com:3268\"\r\n connectionName=\"CN=administrator,DC=ephesoft,DC=com\"\r\n connectionPassword=\"password\"\r\n userBase=\"DC=ephesoft,DC=com\"\r\n userSearch=\"(sAMAccountName={0})\"\r\n userSubtree=\"true\"\r\n referrals=\"follow\"\r\n roleBase=\"DC=ephesoft,DC=com\"\r\n roleName=\"cn\"\r\n roleSubtree=\"true\"\r\n roleSearch=\"(member={0})\"\r\n \r\n \/>\r\n<\/pre>\nSpecifying the AD Group as Super_Admin<\/span><\/h4>\n
To edit this you will need to navigate to the Following location:<\/p>\n
Scroll to the setting below and remove the entry “admin” and replace with the Assigned AD Security Group.<\/p>\n
user.super_admin=<GroupName><\/p>\n
Sample Application.properties:<\/p>\n
#Super admin group update disabled.\r\n ephesoft.product.version=3.0.2.0\r\n report.ant.buildfile.path=C:\\\\Ephesoft\\\\Report\/ephesoft-reporting\/build.xml\r\n enable.reporting=true\r\n enable.uploadBatch=true\r\n #default doc type view can be \"dropdown_list\" or \"suggest_box\"\r\n document.default_doc_type_view=suggest_box_view\r\n function_key_script_name=ScriptFunctionKey\r\n #This property value has become obsolete. No need to set its value from version 3.0.2.0 onwards.\r\n tesseract_version_3=C:\\\\Ephesoft\\\\Application\/native\/Tesseract-OCR\r\n field_value_change_script_name=ScriptFieldValueChange\r\n row_count=50\r\n zip_switch=true\r\n update_interval=5\r\n preloaded_image_count=3\r\n #0 for html cleaner(default)\r\n #any other value for Tidy parser (Support for EE 2.4 or earlier)\r\n html_parser=0\r\n custom_reports_url=http:\/\/www.ephesoft.com<\/a>\r\n custom_reports_title=Ephesoft\r\n custom_reports_pop_up_xdimension=500\r\n custom_reports_pop_up_ydimension=500\r\n enable.restart_all_batch=false\r\n batchlist.table_row_count=15\r\n zoom_count=1\r\n create_batch_instance_backup=off\r\n plugin_upload_folder_path=C:\\\\Ephesoft\\\\SharedFolders\/plugin-upload-folder\r\n user.super_admin=admin\r\n help_url=http:\/\/www.ephesoft.com\/wiki\/index.php?title=Special:Search<\/a>\r\n batch_copy_timeout=3600\r\n # 1-RoundRobin (Default)\r\n # 0-BatchInstancePriority\r\n workflow.batchPickingAlgo=1\r\n # false for review panel as closed on Review-Validation screen for batches with READY_FOR_VALIDATION state\r\n # true for review panel as open by default on Review-Validation screen for batches with READY_FOR_VALIDATION state\r\n default_review_panel_open=false\r\n # 0 for limited\/metered user\r\n # 1 for shared user(not implemented)\r\n # 2 for dedicated\r\n user_type=2\r\n # file size limit in KB.\r\n upload_batch_limit=1024\r\n # Set this property as true if super admin roles has been updated\r\n update_super_admin_group=false\r\n<\/pre>\nUpdate – Super Admin Group Setting in v3.0.2.0 or Higher<\/span><\/h4>\n
The following line has been added to the Application.properties file regarding applying changes to the user.super_admin Group.<\/p>\n
# Set this property as true if super admin roles has been updated\r\n update_super_admin_group=false\r\n<\/pre>\nWhen changes are made to the user.super_admin line on the same file, you will need to set the above line to\u00a0true<\/b>. Then you will restart Ephesoft and it will set the new group as the Super Admin.<\/p>\n
Limitations of this Solution<\/span><\/h4>\n
Issue: Choosing the below authentication may run into ambiguity. That is in case we have multiple users by same \u201cname\u201d(the user distinguishing parameter in realm). This will lead to a point where we cannot handle the client log in request as it will depend on LDAP\/MS Active Directory implementations. It depends on how the concerned server will choose the user. Please see example:<\/p>\n
Three users:<\/p>\n
\n
- \n
\n
- CN=admin, OU=sales, DC=ephesoft, DC=com<\/li>\n
- CN=admin, OU=java, OU=tech, DC=ephesoft, DC=com<\/li>\n
- CN=admin, OU=management, DC=ephesoft, DC=com<\/li>\n
- Realm \u201cuser base\u201d set to domain components (DC=ephesoft, DC=com).<\/li>\n
- Realm \u201cuser search\u201d set to \u201ccn={0}\u201d. (Checks for common name = <Value used for login>)<\/li>\n
- Intended user to log in CN=admin, OU=sales, DC=ephesoft, DC=com.<\/li>\n<\/ul>\n<\/dd>\n<\/dl>\n
In the above scenario, the realm searches all child entries of DC=ephesoft, DC=com in LDAP\/MS AD server with username(\u201cadmin\u201d) to be equal to common name value of any user entry lying under \u201cDC=ephesoft, DC=com\u201d. In this case it will find the first matching entry and will authenticate against it. This chosen entry might not be the desired one. The point of concern here is choosing \u201cuser search\u201d parameter carefully.<\/p>\n
Solution:<\/p>\n
\n
- \n
\n
- Keep the \u201cuser search\u201d value in realm in way that it can identify your user uniquely. That is the parameter used for searching a user must uniquely identify each of the user entries in LDAP\/ MS AD.<\/li>\n
- Make the user enter the its value for that unique parameter into username while logging in to the application.<\/li>\n
- Keeping cn(common name), first name, last name as \u201cuser search\u201d parameter may cause such scenario.<\/li>\n<\/ul>\n<\/dd>\n<\/dl>\n
Configuring Active Directory at the OU Level<\/span><\/h4>\n
Written by – Pat Myers @ Zia consulting.<\/i><\/p>\n
First you have to configure the Active Directory to pull the groups so you can set the role(s) for the batch classes. To do this you will modify the user-connectivity.properties file located in: Epehesoft Install Directory\\Application\\WEB-INF\\classes\\META-INF\\dcma-user-connectivity<\/p>\n
Set up the following properties for Active Directory:<\/p>\n
user.msactivedirectory_url= ldap:\/\/YourDomain.com:389\r\nuser.msactivedirectory_config=com.sun.jndi.ldap.LdapCtxFactory\r\nuser.msactivedirectory_context_path=OU=Security Groups\r\nuser.msactivedirectory_domain_component_name=yourdomain\r\nuser.msactivedirectory_domain_component_organization=com\r\nuser.msactivedirectory_user_name=CN=Ephesoft Service,OU=Users,DC=YourDomain,DC=com\r\nuser.msactivedirectory_password=UserPassword\r\n# filter can have |(OR), &(AND) and\u00a0!(NOT)\r\n# | (|(cn=a*))\r\n# & (&(cn=a*))\r\n#\u00a0! (!(cn=a*))\r\n# complex example ((!(cn=a*))(|(cn=ephesoft*)(&(cn=b*)))\r\nuser.msactivedirectory_group_search_filter=\r\n# 0 for LDAP\r\n# 1 for MS Active Directory\r\n# 2 for Tomcat\r\nuser.connection=1\r\n<\/pre>\nuser.msactivedirectory_url<\/b>\u00a0\u2013 This is the url to the LDAP server<\/p>\n
user.msactivedirectory_context_path<\/b>\u00a0\u2013 path to root where groups reside. Multiple locations can be specified with a \u201c;;\u201d delimiter (eg. OU=Internal Groups;;OU=Contractors)<\/p>\n
user.msactivedirectory_domain_component_name<\/b>\u00a0\u2013 component value for AD is DC below the root DC. There can only one value here such as ‘ephesoft’. ‘cn=na,cn=ephesoft’ or ‘cn=ephsesft’ is not allowed.<\/p>\n
user.msactivedirectory_domain_component_organization<\/b>\u00a0\u2013 root DC of the AD store (typically \u201ccom\u201d)<\/p>\n
user.msactivedirectory_user_name<\/b>\u00a0\u2013 User name to connect to the AD server.<\/p>\n
user.msactivedirectory_password<\/b>\u00a0\u2013 User password to connect to the AD server.<\/p>\n
user.msactivedirectory_group_search_filter<\/b>\u00a0– Display only the groups that meets the filter value<\/p>\n
user.connection<\/b>\u00a0\u2013 value should be set to 1 to read the AD configuration (opposed to LDAP or Tomcat properties)<\/p>\n
If you have batch classes you should now restart the Ephesoft service set the roles for the batch classes.<\/p>\n
Next you have to modify the path for authentication of the users. The file you have to modify is called server.xml and it is located in: {EPHESOFT_ROOT_DIR}\\JavaAppServer\\conf\\\u00a0NOTE: IN EPHESOFT v2.5 Realm settings are located in {EPHESOFT_ROOT_DIR}\\JavaAppServer\\conf\\Catalina\\localhost\\dcma.xml INSTEAD OF server.xml<\/b><\/p>\n
Modify the realm element to have the url, name, password, pattern and role base for the Active Directory instance.<\/p>\n
<Realm \r\n className=\"org.apache.catalina.realm.JNDIRealm\"\r\n connectionURL=\"ldap:\/\/YourDomain.com:389\"\r\n connectionName=\"CN=Ephesoft Service,OU=Users,DC=YourDomain,DC=com\"\r\n connectionPassword=\"UserPassword \"\r\n userPattern=\"cn={0},OU=Users,DC=YourDomain,DC=com\"\r\n roleBase=\"OU=Security Groups,DC=YourDomain,DC=com\"\r\n roleSubtree=\u201dtrue\u201d\r\n roleName=\"cn\"\r\n roleSearch=\"member={0}\"\r\n\/>\r\n<\/pre>\nAttributes in Realm element that need to be modified:<\/p>\n
connectionURL<\/b>\u00a0\u2013 This is the url to the LDAP server<\/p>\n
connectionName<\/b>\u00a0\u2013 User name to connect to the AD server.<\/p>\n
connectionPassword<\/b>\u00a0\u2013 User password to connect to the AD server.<\/p>\n
userPattern<\/b>\u00a0\u2013 path and pattern to the users<\/p>\n
roleBase<\/b>\u00a0\u2013 path to root where groups reside. Groups must have a common OU to be included in the role base but can be is sub directories under this specified root<\/p>\n
roleSubtree<\/b>\u00a0– attribute to enable searches in sub groups<\/p>\n
roleName<\/b>\u00a0\u2013 attribute in AD of the Groups that should be included<\/p>\n
roleSearch<\/b>\u00a0\u2013 attribute in the groups specifying the user. The {0} is used as a wild card to indicate all users in those groups<\/p>\n
Once the configuration is set restart the server and log in as the AD user with the value that is placed in as the cn value (the cn may be the full name) and the AD password.<\/p>\n
Complex Example<\/span><\/h4>\n
Requirements<\/b><\/p>\n
\n
- Customer wants to use login name, instead of name, last name combination. Implementation of sAMAccountName.<\/li>\n
- Users are created in different OUs, i.e. location or department based AD structure. i.e. MyOrganization, YourOrganization, Accounting, HR. etc<\/li>\n
- Customer has sub domain. Users and groups are defined under this sub domain such as user@MySubDomain.MyDomain.com. If this user is located in\u00a0Users<\/b>\u00a0group inside\u00a0Accounting<\/b>\u00a0organizational unit, it would be equal toCN=user,OU=Users,OU=Accounting,MySubDomain,DC=MyDomain,DC=com<\/b><\/li>\n<\/ul>\n
server.xml configuration:<\/b><\/p>\n
<Realm className=\"org.apache.catalina.realm.JNDIRealm\"\r\n connectionURL=\"ldap:\/\/MyServer.MySubDomain.MyDomain.com:389\"\r\n connectionName=\"CN=Ephesoft_serviceAccount,OU=Service Users,OU=Users,OU=MyDepartment,OU=MyOrganization,DC=MySubDomain,DC=MyDomain,DC=com\"\r\n connectionPassword=\"**********\"\r\n userBase=\"DC=MySubDomain,DC=MyDomain,DC=com\"\r\n userSearch=\"(&(objectClass=user)(sAMAccountName={0}))\"\r\n userSubtree=\"true\"\r\n roleBase=\"DC=MySubDomain,DC=MyDomain,DC=com\"\r\n roleSubtree=\"true\"\r\n roleName=\"cn\"\r\n roleSearch=\"(&(objectClass=Group)(member={0}))\"\r\n referrals=\"follow\"\/>\r\n<\/pre>\nuser-connectivity.properties configuration:<\/b><\/p>\n
user.msactivedirectory_url=ldap:\/\/MyServer.MySubDomain.MyDomain.com:389\r\nuser.msactivedirectory_config=com.sun.jndi.ldap.LdapCtxFactory\r\nuser.msactivedirectory_context_path=OU=Ephesoft,OU=Groups,OU=MyDepartment,OU=MyOrganization;;OU=YourDepartment,OU=MyOrganization\r\nuser.msactivedirectory_domain_component_name=MySubDomain,dc=MyDomain\r\nuser.msactivedirectory_domain_component_organization=com\r\nuser.msactivedirectory_user_name=CN=Ephesoft_serviceAccount,OU=Service Users,OU=Users,OU=MyDepartment,OU=MyOrganization,DC=MySubDomain,DC=MyDomain,DC=com\r\nuser.msactivedirectory_password=************\r\n<\/pre>\nAuthorization of Ephesoft URLs<\/span><\/h3>\n
Ephesoft has several URLS such as<\/p>\n
\n
- BatchList.html<\/li>\n
- BatchClassManagement.html<\/li>\n
- BatchInstanceManagement.html<\/li>\n
- ReviewValidate.html<\/li>\n
- WebScanner.html<\/li>\n
- Reporting.html<\/li>\n<\/ul>\n
Administrators can authorize access to these URLs using group\/role names defined in Tomcat, LDAP and MS Active Directory. Web.xml can be found here:\u00a0*{EPHESOFT_ROOT_DIR}\\WEB_INF\\web.xml<\/b>\u00a0By Default all URLs authorized by all groups by using\u00a0“*”<\/b>\u00a0in the auth-constrain node:<\/p>\n
\t\t<auth-constraint>\r\n\t\t\t<role-name>*<\/role-name>\r\n\t\t<\/auth-constraint>\r\n<\/pre>\nTo authorize a specific security role, LDAP container), administrators should modify the role-name node.<\/p>\n
Examples: 1) to allow a role to access BatchInstanceManagement.html(role taken here admin):<\/p>\n
<security-constraint>\r\n <web-resource-collection>\r\n <web-resource-name>batch instance management<\/web-resource-name>\r\n <url-pattern>\/BatchInstanceManagement.html<\/url-pattern>\r\n <http-method>GET<\/http-method>\r\n <http-method>POST<\/http-method>\r\n <\/web-resource-collection>\r\n <auth-constraint>\r\n <role-name>admin<\/role-name>\r\n <\/auth-constraint>\r\n <\/security-constraint>\r\n<\/pre>\nHere we have allowed the role by mentioning it in the auth-constraint tag.<\/p>\n
2) To allow multiple roles to access BatchInstanceManagement.html do the following configuration(roles taken here are role2 and admin):<\/p>\n
\r\n<security-constraint>\r\n <web-resource-collection>\r\n <web-resource-name>batch instance management<\/web-resource-name>\r\n <url-pattern>\/BatchInstanceManagement.html<\/url-pattern>\r\n <http-method>GET<\/http-method>\r\n <http-method>POST<\/http-method>\r\n <\/web-resource-collection>\r\n <auth-constraint>\r\n <role-name>role2<\/role-name>\r\n <role-name>admin<\/role-name>\r\n <\/auth-constraint>\r\n <\/security-constraint>\r\n<\/pre>\nHere the <Security-role> tag need not to be modified. It can remain as it is with a single entry (*) allowing all groups. However it may give warnings if security-role tag is not mapped to groups individually. These warnings can be eliminated by providing mapping for roles in <security-role> tag.<\/p>\n
<security-role>\r\n <role-name>*<\/role-name>\r\n <\/security-role>\r\n\r\n<\/pre>\n
\n
\n
\n[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"featured_media":0,"parent":21480,"menu_order":4,"comment_status":"closed","ping_status":"open","template":"","doc_tag":[],"yoast_head":"\nHow to Administer Ephesoft Users and Groups | Ephesoft Docs<\/title>\n\n\n\n\n\n\n\n\n\n\n\t\n