Get Roles Against Object URIs
Processes specified URIs and returns all available permissions and users that have those permissions for each object.
Request
POST {env_uri}/reltio/permissions/{tenant}/_getAccessRoles
Contains list of URIs to get information about allowed operations and accepted users.
Name | Required | Details | |
---|---|---|---|
Headers | Authorization |
Yes | Information about authentication access token in format "Bearer <Access-Token>" (see details in Authentication API). |
Content-Type |
Yes | Should be "Content-Type: application/json ".
|
|
Query |
accessTypes
|
No | List of access types for which we want to obtain roles. Default: all access types. |
Body | List of object URIs. Example:
Note: The operation supports only entities and change
requests.
|
Response
For each URI from an input list, response contains information about all privileges for all roles.
If there is an empty accessRoles
field in the result, then analyze
the values of the allPermitted
field-if it is true, then any
role has all permissions, otherwise there are no roles which have any permission for
that particular object.
accessRoles
for applied/rejected change requests, an empty object with
allPermitted=false
is returned, because no role can apply or reject a
change request that is already applied/rejected.All permissions with roles for a list of URIs
Request
POST {env_uri}/reltio/permissions/{tenant}/_getAccessRoles
Headers: Authorization: Bearer <Access-Token>, Content-Type: application/json
Body:
[
"entities/00005KL",
"entities/0000I77",
"changeRequests/00010rp"
]
Response
Body:
[
{
"objectUri": "entities/0000I77",
"allPermitted": false,
"accessRoles": [
{
"access": "ACCEPT_CHANGE_REQUEST",
"roles": [
"API_USER2",
"API_USER1"
]
},
{
"access": "UNMERGE",
"roles": [
"API_USER2",
"API_USER1"
]
},
{
"access": "MERGE",
"roles": [
"API_USER2",
"API_USER1"
]
},
{
"access": "READ",
"roles": [
"API_USER2",
"API_USER1"
]
}
]
},
{
"objectUri": "entities/00005KL",
"allPermitted": false,
"accessRoles": [
{
"access": "ACCEPT_CHANGE_REQUEST",
"roles": [
"API_USER2",
"API_USER1"
]
},
{
"access": "UNMERGE",
"roles": [
"API_USER2"
]
},
{
"access": "MERGE",
"roles": [
"API_USER2"
]
},
{
"access": "READ",
"roles": [
"API_USER2",
"API_USER1"
]
}
]
},
{
"objectUri": "changeRequests/00010rp",
"allPermitted": false,
"accessRoles": [
{
"access": "READ",
"roles": [
"API_USER2",
"API_USER1"
]
}
]
}
]
Get Roles With Specific Permissions
Request
POST {env_uri}/reltio/permissions/{tenant}/_getAccessRoles?accessTypes=READ,MERGE
Headers: Authorization: Bearer <Access-Token>, Content-Type: application/json
Body:
[
"entities/00005KL"
]
Response
Body:
[
{
"objectUri": "entities/00005KL",
"allPermitted": true,
"accessRoles": [
{
"access": "READ",
"roles": [
"API_USER2",
"API_USER1"
]
},
{
"access": "MERGE",
"roles": [
"API_USER2",
"API_USER1"
]
}
]
}
]