Access ControlControlling Access in Loftware Enterprise SP

Loftware Enterprise™ SP uses a combination of role-based access control and object-based access control to provide security. Administrators can specify what objects a user has access to and what actions a user can perform on a given type of object.

Important! For a user to be able to perform an action on an object, the user must have both role-based permission to perform the action on that type of object and object-based permission to perform that action on the object.

Authenticating Users

Loftware Enterprise SP has the concept of local and domain users. Local users are assigned a password by the administrator within the Loftware Enterprise SP system. Domain users are configured in Loftware Enterprise SP, but their passwords are stored in an LDAP or Federated Single Sign-On system.

If you use an LDAP, Azure, or Single Sign-On system, Loftware Enterprise SP can use that system to authenticate the user. You can also configure auto-provisioning to automatically create and update users and group assignments. For more information, see Configuring Authentication.

Configuring Access

At a basic level you perform the following tasks when configuring security in Loftware Enterprise SP.

Restrictive versus Permissive Security

In a restrictive security configuration, you block access to most or all objects (also called entities) by default and then selectively grant access to specific users or groups. This approach is also known as whitelisting. By default Loftware Enterprise SP has restrictive security. All permissions except List permission for Folders are denied.

In a permissive security configuration, you allow access to most or all objects by default and then selectively block access by specific users or groups. This approach is also known as blacklisting.

Access Concepts in Loftware Enterprise SP

Loftware Enterprise SP provides a powerful and flexible security model for access control. Depending on your background, this security model may include dimensions that are new to you.

ClosedA permission can be granted or denied

ClosedPermissions are specific to object type

ClosedBoth object access permission and role-based permission are required

ClosedPermissions can be inherited

ClosedOrder of evaluation limits inheritance

ClosedObject access permissions should be configured at the folder level

ClosedAll users must be assigned a role

ClosedVisual indication of complex inheritance is limited

Note: For some special roles and user accounts, such as the ROLE_ADMINISTRATOR role and the SuperAdmin, ClientAdmin, and SystemAdmin users, some granted permissions may not be displayed.

Best Practices for Access Control

  • Create folders for objects that require similar permissions, and then assign object access permissions at the folder level by using Default Permissions.
  • Configure role-based permissions for roles, assign roles to groups, and add users to groups.
  • Limit the number of roles assigned to a user to prevent conflicting permissions. Ideally each user should have only one role.

Important! After installing Loftware Enterprise SP and before you create any objects, you should rename the root folder (initially named Default) to something relevant to your organization. In a multi-site deploymentClosed A configuration of a Loftware environment that includes Loftware instances located at different sites within the same WAN. In a multi-site deployment, each Loftware instance acts as either a headquarters or a facility., the name of the root folder must be the same at the headquarters (HQ) and at each facility associated with that HQ.