Cloud Portal

Role-Based Access Control

We've introduced access permissions for organization end-user roles. This article provides the following information on creating and managing role-based access control (RBAC) within your organization:

Overview of RBAC

Previously, all end-user roles within an organization had the same access to app data. With the latest release, you can set fine-grained read-write access controls to app data.

For instance, create, modify, and delete custom roles; establish organization hierarchies for permissions delegation; set permissions for portal functionality like viewing collections, querying tokens, transferring apps between organizations; and more.

Since implementing role-based access control, organization members no longer have read-write access to app data by default.

To regain access, create custom roles that include permissions for accessing and modifying app data, and then assign these roles to the appropriate organization members. For instructions, see Creating Roles and Assigning Roles.

Organization Permissions Settings

When configuring access control for roles within an organization, there are various types of privileges you can choose from.

Available within the portal > Settings > Roles, the following graphic and corresponding table provide an overview of the various settings you can configure for roles within an organization:

Document image


As indicated using matching superscript numbers, some privileges have one or more dependencies with other privileges. For example:

  • ¹ Selecting Accept incoming app transfer requests automatically toggles View incoming app transfer requests, granting both read and write privileges.
  • ² Selecting Access audit logs automatically toggles View access grants, granting view access to active app transfer requests.

Item

Setting

Description

1

Accept incoming app transfer requests¹

Initiate, approve, or cancel requests to transfer apps between organizations.

2

Create an app

Set up new apps.

3

View organization details

Access and view details related to the organization.

4

Reject incoming app transfer requests

Decline requests from other organizations to transfer apps to the organization.

5

View access grants²𝄒⁴

Review the permissions granted to specific users, roles, or organizations.

6

Access audit logs²𝄒³

Review audit logs.

7

Manage organization members

Oversee and administer the membership of an organization.

8

View incoming app transfer requests¹𝄒²𝄒³

See requests from other organizations to transfer apps into the organization.

9

Update the organization details

Modify information related to the organization.

10

Manage access grants

Control and administer access privileges granted to other roles within the organization.

App Permissions Settings

Following is an overview of the various settings that, once assigned, grant end users the ability to manage the app. (See Creating Roles)

Document image


Item

Setting

Description

1

Cancel a request for an app transfer

Withdraw active requests to transfer apps to other organizations.

2

Delete an app

Permanently remove apps.

3

Delete API keys

Revoke authentication and authorization to access to app data.

4

View app details

Access and review specific information and settings associated with apps.

5

Access offline-only licenses²𝄒⁶

View the licenses designating apps for offline usage.

6

Update app details

Modify the information and settings associated with apps.

7

Modify app data

Make changes to mesh-generated transactional data.

8

Request offline-only licenses

Manage the licenses designating apps for offline usage.

9

Create API keys⁶𝄒⁸

Generate unique identifiers used for authentication and authorization access to app data.

10

View app metrics

Review various analytics associated with apps.

11

Access API keys²𝄒⁶𝄒⁷𝄒⁸

View the API keys used for authentication and authorization to access app data.

12

Initiate a request for the transfer of an app

Transfer ownership of apps to other organizations.

Organization Roles

To establish role-based access controls for your organization:

1

Create new roles with the desired settings. (Creating New Roles)

2

Designate roles for the appropriate end users within your organization. (Assigning Roles to End Users)

Creating New Roles

To add a new role to your organization:

1

From your organization, click Settings.

2

Click Roles.

3

Click Add new role.

Document image

4

Click to select and deselect the settings you want to apply to your new role as desired, and then click Create role.

For organization members to regain read-write access to app data, enable Access app data and Modify app data in the App permissions as shown in the following graphic.

Once you've created your role with read-write access permissions, make sure to assign the role to your members as appropriate. (Assigning Roles)

Document image




Assigning Roles to End Users

Once you've created a role, designate them to the appropriate end users within your organization:

1

From Settings > Members, click Invite member located on the right.

Document image

2

From the Invite users modal that appears:

  1. Enter the email belonging to the end user you want to add.
  2. Click Role and select the role type you want to assign.
  3. Click Add to list.
  4. When finished adding end users to the invite, click Invite users.



Document image


Viewing Pending Member Invitations

Once a member is assigned a role, Ditto automatically sends a formal invitation to the email address specified in the invite, which must be accepted before RBAC privileges take effect.

To view a list of invitations waiting for approval, go to Settings > Members in the portal. A complete list of invitations display within Pending member invitations, as shown in the following graphic:

Document image


Modifying and Deleting Roles

To edit a role's settings or permanently remove a role from your organization:

1

From your organization, click Settings.

2

Click Roles.

3

Click the three-dot menu next to the role you want to modify or delete:

  • To modify, select Edit.
  • To permanently remove, select Delete.
Document image


Ditto Employee Access Grants

There are circumstances in which Ditto's support team requires elevated privileges to access your app data, for instance, to troubleshoot an issue.

Ditto employees can only access your app data with an approved access grant. An access grant is a formal authorization provided by any of the following to approve the access request initiated by Ditto:

  • Current organization owner
  • Organization roles configured with Manage access grants privileges

Once accepted, you can revoke access grants at any time. (See Revoking Access)

For more information, see Organization Permissions Settings and Accepting Access Grants.

Granting Access

To approve a Ditto-initiated access grant:

1

Click Apps.

2

From Access grants, click Accept.

Document image


Revoking Access

Once an access grant is approved, you can end access at any time:

1

Click Apps.

2

From Access grants, click Revoke access.

Document image