On big projects it is quite likely that large numbers of developers have access to a many environments. Occasionally they can have access to environment which is quite important, for instance one that the customer is using for training or testing.
To reduce the likelihood of developers accidentally deleting some data that they shouldn’t it would be quite normal to remove their access to the environment altogether. However if they need access for troubleshooting purposes then (at least on projects I’ve seen) it’s quite normal for developers to be told “OK, you can have access, but be careful not to do anything destructive”. Occasionally - as with everything - things can go wrong. Either someone forgets which environment they’re in, or does something with unintended consequences. An alternative to the “just be careful” approach would be to create an entirely read-only user profile (i.e. one that has display only privileges to every component system-wide).
Read-only user profile is where no fields are editable and the save button is inactivated.
Also, on Run Control pages the ‘Run’ button is inactive. It’s going to be pretty difficult to alter data in this environment.
Read-only user profile is where no fields are editable and the save button is inactivated.
Also, on Run Control pages the ‘Run’ button is inactive. It’s going to be pretty difficult to alter data in this environment.
Create User Profile
First, craft your perfect ‘read/write’ user profile. I’ll call this ‘SIMER’. Now clone it using the ‘Copy User Profile’ functionality in the PIA. This creates a new user profile (in my case ‘SIMER_R’) with the same Roles, and this is the one we’re going to turn read-only.
Create new Read-Only Permission Lists
First create the Permission Lists by cloning those that are currently against the User Profile:
INSERT INTO PSCLASSDEFN
(CLASSID, VERSION, CLASSDEFNDESC, TIMEOUTMINUTES, DEFAULTBPM,
STARTAPPSERVER, ALLOWPSWDEMAIL, LASTUPDDTTM, LASTUPDOPRID)
(SELECT CLASSID || ‘_R’
, VERSION
, CLASSDEFNDESC
, TIMEOUTMINUTES
, DEFAULTBPM
, STARTAPPSERVER
, ALLOWPSWDEMAIL
, SYSDATE
, ‘SIMER’
FROM PSCLASSDEFN
WHERE CLASSID IN (
SELECT DISTINCT CLASSID
FROM PSROLECLASS
WHERE ROLENAME IN (
SELECT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’)))
(CLASSID, VERSION, CLASSDEFNDESC, TIMEOUTMINUTES, DEFAULTBPM,
STARTAPPSERVER, ALLOWPSWDEMAIL, LASTUPDDTTM, LASTUPDOPRID)
(SELECT CLASSID || ‘_R’
, VERSION
, CLASSDEFNDESC
, TIMEOUTMINUTES
, DEFAULTBPM
, STARTAPPSERVER
, ALLOWPSWDEMAIL
, SYSDATE
, ‘SIMER’
FROM PSCLASSDEFN
WHERE CLASSID IN (
SELECT DISTINCT CLASSID
FROM PSROLECLASS
WHERE ROLENAME IN (
SELECT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’)))
Don’t forget to add the sign-on times:
INSERT INTO PSAUTHSIGNON (CLASSID, DAYOFWEEK, STARTTIME, ENDTIME)
SELECT CLASSID || ‘_R’
, DAYOFWEEK
, STARTTIME
, ENDTIME
FROM PSAUTHSIGNON
WHERE CLASSID IN (
SELECT DISTINCT CLASSID
FROM PSROLECLASS
WHERE ROLENAME IN (
SELECT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’))
SELECT CLASSID || ‘_R’
, DAYOFWEEK
, STARTTIME
, ENDTIME
FROM PSAUTHSIGNON
WHERE CLASSID IN (
SELECT DISTINCT CLASSID
FROM PSROLECLASS
WHERE ROLENAME IN (
SELECT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’))
Make the Permission Lists Display Only
We add the pages to the new permission lists, but set Display Only to 1:
INSERT INTO PSAUTHITEM (CLASSID, MENUNAME, BARNAME, BARITEMNAME, PNLITEMNAME, DISPLAYONLY, AUTHORIZEDACTIONS)
(SELECT CLASSID || ‘_R’
, MENUNAME
, BARNAME
, BARITEMNAME
, PNLITEMNAME
, 1 DISPLAYONLY
, AUTHORIZEDACTIONS
FROM PSAUTHITEM
WHERE CLASSID IN (
SELECT DISTINCT CLASSID
FROM PSROLECLASS
WHERE ROLENAME IN (
SELECT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’)))
(SELECT CLASSID || ‘_R’
, MENUNAME
, BARNAME
, BARITEMNAME
, PNLITEMNAME
, 1 DISPLAYONLY
, AUTHORIZEDACTIONS
FROM PSAUTHITEM
WHERE CLASSID IN (
SELECT DISTINCT CLASSID
FROM PSROLECLASS
WHERE ROLENAME IN (
SELECT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’)))
Create the new Read-Only Roles
INSERT INTO PSROLEDEFN
(ROLENAME, VERSION, ROLETYPE, DESCR, QRYNAME, ROLESTATUS, RECNAME, FIELDNAME, PC_EVENT_TYPE, QRYNAME_SEC, PC_FUNCTION_NAME, ROLE_PCODE_RULE_ON, ROLE_QUERY_RULE_ON, LDAP_RULE_ON, ALLOWNOTIFY, ALLOWLOOKUP, LASTUPDDTTM, LASTUPDOPRID, DESCRLONG)
(SELECT SUBSTR(ROLENAME, 1,28) || ‘_R’
, VERSION
, ROLETYPE
, DESCR
, QRYNAME
, ROLESTATUS
, RECNAME
, FIELDNAME
, PC_EVENT_TYPE
, QRYNAME_SEC
, PC_FUNCTION_NAME
, ROLE_PCODE_RULE_ON
, ROLE_QUERY_RULE_ON
, LDAP_RULE_ON
, ALLOWNOTIFY
, ALLOWLOOKUP
, SYSDATE
, ‘SIMER’
, DESCRLONG
FROM PSROLEDEFN
WHERE ROLENAME IN (
SELECT DISTINCT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’))
(ROLENAME, VERSION, ROLETYPE, DESCR, QRYNAME, ROLESTATUS, RECNAME, FIELDNAME, PC_EVENT_TYPE, QRYNAME_SEC, PC_FUNCTION_NAME, ROLE_PCODE_RULE_ON, ROLE_QUERY_RULE_ON, LDAP_RULE_ON, ALLOWNOTIFY, ALLOWLOOKUP, LASTUPDDTTM, LASTUPDOPRID, DESCRLONG)
(SELECT SUBSTR(ROLENAME, 1,28) || ‘_R’
, VERSION
, ROLETYPE
, DESCR
, QRYNAME
, ROLESTATUS
, RECNAME
, FIELDNAME
, PC_EVENT_TYPE
, QRYNAME_SEC
, PC_FUNCTION_NAME
, ROLE_PCODE_RULE_ON
, ROLE_QUERY_RULE_ON
, LDAP_RULE_ON
, ALLOWNOTIFY
, ALLOWLOOKUP
, SYSDATE
, ‘SIMER’
, DESCRLONG
FROM PSROLEDEFN
WHERE ROLENAME IN (
SELECT DISTINCT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’))
Add the read only permission lists to the read only roles
INSERT INTO PSROLECLASS(ROLENAME, CLASSID)
(SELECT SUBSTR(ROLENAME, 1,28) || ‘_R’
, CLASSID || ‘_R’
FROM PSROLECLASS
WHERE ROLENAME IN (
SELECT DISTINCT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’))
(SELECT SUBSTR(ROLENAME, 1,28) || ‘_R’
, CLASSID || ‘_R’
FROM PSROLECLASS
WHERE ROLENAME IN (
SELECT DISTINCT ROLENAME
FROM PSROLEUSER
WHERE ROLEUSER = ‘SIMER_R’))
Update the user profile with the new read only rolenames
UPDATE PSROLEUSER
SET ROLENAME = SUBSTR(ROLENAME, 1,28) || ‘_R’
WHERE ROLEUSER = ‘SIMER_R’
SET ROLENAME = SUBSTR(ROLENAME, 1,28) || ‘_R’
WHERE ROLEUSER = ‘SIMER_R’
And that’s it, although you may well also need to perform the following:
* Run Portal Security Sync (to sync security up).
* Bounce the App Server and clear cache (my App Server didn’t pick up the signon times from the cloned permission lists until I did this).
* Run SJT_OPR_CLS (Refresh the Security Join Table that contains the Operator and Classid data)
* Close and reopen your Web Browser and clear it’s local cache.
* Bounce the App Server and clear cache (my App Server didn’t pick up the signon times from the cloned permission lists until I did this).
* Run SJT_OPR_CLS (Refresh the Security Join Table that contains the Operator and Classid data)
* Close and reopen your Web Browser and clear it’s local cache.
No comments:
Post a Comment