Role-based proxy authentication information

Any asset defined in the ACDB can have a list of roles that have role-based proxy authentication information that allows access to the asset. All users who are granted a role can access the proxy authentication information created for that role.

For example, if user “Bob” wants to access “AssetX,” he must have either user-based proxy authentication information for AssetX, or he must be granted a role that has the appropriate role-based proxy authentication information to access AssetX.

When multiple roles have proxy authentication information defined for the same asset, the roles must be assigned a priority order so a user who has more than one role that has proxy authentication information for any given asset can use the role-based proxy authentication information that has the highest priority. For example, Bob has two roles, Manager and Engineer, both of which have proxy authentication information pertaining to a back-end service. If only the Engineer role-based proxy authentication information should be used to authenticate to the service, the Engineer role should have a higher priority than the Manager role. The AssetManagement SMAPI interface provides the setRoleProxyAuthInfoPriorities method, which enables you to set the priority of the roles that have proxy authentication information defined.

If multiple roles have proxy authentication information defined for an asset, the following rules apply:

For example, assume that there are three roles: role1, role2, and role3, and role3 inherits from role2. Proxy authentication information is defined for all three roles. The roles, in order of priority from highest to lowest, are role1, role2, and role3.

Only the PSO, can create, update, and delete role-based proxy authentication information.