Accelerate the Value of Data

Exploring all System Roles

Learn about the System roles you can assign privileges to.

You can use the System roles appropriately by understanding the privileges tied to each of these roles.

The following System roles provide access to multiple services and are detailed as individual topics to cover all the relevant details:

Some System roles are either specific to an individual service, or are a combination of two services. Follow these links to learn more about these roles:

Note: System roles have restricted privileges associated with them. On duplicating the system roles, new customer-specific roles are created excluding these privileges. To get these privileges for the new roles, contact Customer Support. Also, the ROLE_READ and ROLE_READONLY roles are placeholder roles that are used with meta data security.

ROLE_ADMIN_SHIELD

The following image shows the available privileges on resources and sub-resources within the Shield Service in the User Management application in Console for the ROLE_ADMIN_SHIELD role:

Permissions Matrix for the ROLE_ADMIN_SHIELD role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 1. ROLE_ADMIN_SHIELD - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
shield.keyKeyCREATE/READ/UPDATE/DELETEAdministration of crypto keys/policies used for FS level encryption
shield.encryptEncrypt OperationsCREATEApplying the encryption for the FS level data by applying the encryption policy
shield.encrypt.statusEncrypt Operations StatusREADStatus of the encryption state

ROLE_ACTIVITIES

The following image shows the available privileges on resources and sub-resources within the MDM Service (Reltio Platform service) in the User Management application in Console for the ROLE_ACTIVITIES role:

Permissions Matrix for the ROLE_ACTIVITIES role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 2. ROLE_ACTIVITIES - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
mdm.data.activityLogData - Activity LogREADAccess for all the user activities in the tenants
mdm.data.activityLog.personalPersonal ActivitiesCREATE/READ/UPDATEAccess for all the user activities in the tenants
mdm.data.activityLog.entityEntity Level All ActivitiesREADAccess for all user activities of particular entity

ROLE_DATALOADER

The following image shows the available privileges on resources and sub-resources within the MDM (Reltio Platform) service in the User Management application in Console for the ROLE_DATALOADER role:

Permissions Matrix for the ROLE_DATALOADER role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 3. ROLE_DATALOADER - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
mdm.data.entities.profileData - Entities - Data ManagementCREATE/UPDATEDirectly load entities by using REST API
mdm.data.relationsData - RelationsCREATE/UPDATEDirectly load relations by using REST API
mdm.tasks.periodicTenant tasks - Periodic TasksREAD/UPDATE/EXECUTELoad data by using periodic task (big load case)

ROLE_TASKS_CONSISTENCY

Permissions Matrix for the ROLE_TASKS_CONSISTENCY role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 4. ROLE_TASKS_CONSISTENCY - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
mdm.environment.tasksREAD/UPDATE/EXECUTEAll the different environment level tasks
mdm.environment.tasks.consistencyEXECUTEAll the consistency check related APIs

ROLE_ADMIN_USER

This role is associated with a customer and has the following rights:
  • create/update/delete user account administrators
  • access to all user accounts for the specific customer

The following image shows the available privileges on resources and sub-resources within the MDM (Reltio Platform) and Authorization services in the User Management application in Console for the ROLE_ADMIN_USER role:

Permissions Matrix for the ROLE_ADMIN_USER role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 5. ROLE_ADMIN_USER - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
mdm.config.physicalTenant Configurations - PhysicalREADTenant Physical configuration APIs
auth.reltioRolesReltio RolesREADRead access to all the Reltio System roles
auth.reltioServicesReltio ServicesREADView all reltio services
auth.monitoringMonitoringREADView Auth Audit log
auth.customer.userUsersCREATE/READ/UPDATE/DELETEUser Management APIs

ROLE_EXTERNALMATCH_ADMIN

The following image shows the available privileges on resources and sub-resources within the MDM (Reltio Platform) service in the User Management application in Console for the ROLE_EXTERNALMATCH_ADMIN role:

Permissions Matrix for the ROLE_EXTERNALMATCH_ADMIN role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 6. ROLE_EXTERNALMATCH_ADMIN - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
mdm.tasks.periodicMDM Service - Tenant tasks - Periodic TasksREAD/UPDATE/EXECUTEAdministrative access to External Match

ROLE_WORKFLOW

The following image shows the available privileges on resources and sub-resources within the Workflow service in the User Management application in Console for the ROLE_WORKFLOW role.

Important: If you need privileges to create, update, or delete jar files and process definitions, use the separate ROLE_WORKFLOW_ADMIN role.

Permissions Matrix for the ROLE_WORKFLOW role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 7. ROLE_WORKFLOW - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
workflow.dataWorkflow Service - DataCREATE/READ/UPDATE/DELETEAPIs to manage the process instances and tasks
workflow.jobsWorkflow Service - JobsREAD/EXECUTEAPI to manage background tasks
workflow.monitoringWorkflow Service - MonitoringREADMonitoring API
workflow.config.definitionWorkflow Service - Configuration - Process DefinitionCREATE/READ/DELETEAPIs to deploy and manage the process definition
workflow.config.jarWorkflow Service - Configuration - Custom JarsCREATE/READ/DELETEAPIs to manage the custom jar files on a tenant level
workflow.environment.config.registerREADAPIs for managing tenant registration
workflow.environment.config.jarREADAPIs to manage the custom jar files on environment level

ROLE_WORKFLOW_ADMIN

This role provides access to the Workflow service and grants privileges to deploy/undeploy jars on a tenant and to publish/remove process definitions.

Important: This role is separate from ROLE_WORKFLOW, which grants privileges to read — but not create, update, execute, or delete — jar files and process definitions.

This screenshot shows the ROLE_WORKFLOW_ADMIN privileges for resources and sub-resources in the Workflow service displayed in Console > User Management > Roles.

Permissions matrix for the ROLE_WORKFLOW_ADMIN role

This table lists all of the resources, sub-resources, and permissions for ROLE_WORKFLOW_ADMIN in the Reltio Permissions Framework.

Table 8. ROLE_WORKFLOW_ADMIN - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
workflow.jobsWorkflow Service - JobsREAD/EXECUTEAPI to manage background tasks
workflow.monitoringWorkflow Service - MonitoringREADMonitoring API
workflow.config.definitionWorkflow Service - Configuration - Process DefinitionCREATE/READ/DELETEAPIs to deploy and manage the process definition
workflow.config.jarWorkflow Service - Configuration - Custom JarsCREATE/READ/DELETEAPIs to manage the custom jar files on a tenant level
workflow.environment.config.registerREADAPIs for managing tenant registration
workflow.environment.config.jarREADAPIs to manage the custom jar files on environment level

ROLE_UI_ALL_READONLY

This role is related to UI features only, as specified in the UI configuration. All views and menu items are available as read-only for the user, regardless of the UI configuration properties. In other words, the user has all "canRead" view and menu permissions automatically.

Note: "canRead": false still hides a view for the user, no matter what roles the user has.
Tip: If you need to make a read-only user with no permissions to change any data in a tenant, you should not use ROLE_UI_ALL_READONLY. Instead, you should set up permissions on a tenant through metadata configuration and to provide a list of operations the role should support. For example, READ, UPDATE, DELETE, MERGE, and so on.

The following image shows the available privileges on resources and sub-resources within the MDM service in the User Management application in Console for the ROLE_UI_ALL_READONLY role:

Permissions Matrix for the ROLE_UI_ALL_READONLY role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 9. ROLE_UI_ALL_READONLY - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
mdm.data.graphMDM Service - GraphsREADAll Graphs management APIs
mdm.data.helperMDM Service - Helper DataCREATE/READ/UPDATEThe additional helper data management related APIs
mdm.data.entitiesMDM Service - EntitiesCREATE/READ/UPDATE/EXECUTEAll entities management APIs
mdm.data.activityLog.personalMDM Service - Personal ActivitiesCREATE/READ/UPDATEAccess the personal activities in the tenants
mdm.data.groupsMDM Service - GroupsREADAll Groups management APIs
mdm.data.categoriesMDM Service - CategoriesREADAll Categories management APIs
mdm.data.relationsMDM Service - RelationsREADAll relations management APIs
mdm.data.changeRequestsMDM Service - Change RequestsREADAll ChangeRequests management APIs
mdm.data.interactionsMDM Service - InteractionsREADAll Interactions management APIs
mdm.preferenceMDM Service - PreferenceREADUser Preference related APIs
mdm.monitoringMDM Service - MonitoringREADAPIs for monitoring the tenant
mdm.configMDM Service - Tenant ConfigurationsREADAll the tenant level configurations
mdm.tasksMDM Service - Tenant tasksREADAll the tenant level tasks APIs
auth.customer.user.tenantsUser TenantsREADAPIs for managing the user tenants
auth.customer.user.profileUser ProfileREADAPIs for managing basic user profile information
export.dataExport Service - Data ExportEXECUTEExtract all data from tenant
export.configExport ConfigurationREADGet the export configuration
export.config.tasksExport Service - TasksREAD/UPDATE/EXECUTEAPIs related to export tasks
validate.dataValidation Service - Data validationEXECUTEAbility to run validation on data type

ROLE_UI_ALL

This role is related to UI features only, as specified in the UI configuration. All views and menu items are fully available for the user, regardless of UI configuration properties. User has all "canCreate", "canRead", "canUpdate", "canDelete" view and menu permissions automatically.

The following image shows the available privileges on resources and sub-resources within the MDM service in the User Management application in Console for the ROLE_UI_ALL role:

Permissions Matrix for the ROLE_UI_ALL role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 10. ROLE_UI_ALL - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
mdm.preferencesMDM Service - PreferencesCREATE/READ/UPDATE/DELETEAPIs to manage user preferences and UI states
mdm.notificationsMDM Service - NotificationsCREATE/READ/UPDATE/DELETEAPIs to manage user UI notifications

ROLE_STATISTICS_REPORTING

The following image shows the available privileges on resources and sub-resources within the Statistics Reporting service in the User Management application in Console for the ROLE_STATISTICS_REPORTING role:

Permissions Matrix for the ROLE_STATISTICS_REPORTING role

In the Permissions Framework, these same resources, sub-resources, and permissions would translate to the following information:

Table 11. ROLE_STATISTICS_REPORTING - Details
Service.Resource.Sub-resource IDLabelAllowed PrivilegesPurpose
reportingservice.statisticsdataStatistics DataREADRead Statistics Data