Configuring the Liberty user registry
The access levels that each user receives within i2 Analyze are determined by their membership of groups. The names of these groups must match the group permissions elements values that are defined in your security schema.
Before you begin
About this task
- You must create groups in the Liberty user
registry whose names exactly match the
UserGroup
attribute of the group permissions elements in the security schema. - You must ensure that every user is a member of enough groups such that they are assigned a dimension value and level from each access security dimension. A user does not require a mapping to a grant security dimension.
To illustrate these rules, consider that the example security schema defines the following dimensions and groups:
Group Permissions UserGroup value |
Group Permissions for Dimension | Dimension values and level |
---|---|---|
Analyst | Security Compartment | Human Informants - update, Open Source Intelligence - read_only |
Clerk | Security Compartment | Open Source Intelligence - update |
Controlled | Security Level | Controlled - update |
Unclassified | Security Level | Controlled - update, Unclassified - update |
Security Controller | Grant Access | Security Controller - update |
To map to this security schema, the user group values in the table must match with the user groups in the user repository.
Each user in this deployment must be in either of the "Analyst" or "Clerk" groups, and either of the "Controlled" or "Unclassified" groups.
Every deployment must contain an account that
is associated with the administrator role. You can
create a group in the user registry named
"Administrator", or you can change the value of
the security.administrator.group
property to the name of an existing group in the
repository. The
security.administrator.group
property is in the
environment-advanced.properties
file for each application, in the
toolkit\configuration\environment\application
directory. When an i2 Analyze user is a
member of this group, they can access
administrative features.
The following process is an approach to security in Liberty that uses a basic user registry.
Procedure
-
Create the users and groups in Liberty for
each of the group permissions elements in the
security schema.
-
Use the Liberty
securityUtility command to
encode the password for each user.
- Save and close the file.
What to do next
To test that your changes have worked, log in to i2 Analyze as one of the users that you added to the user registry.
After you test your changes to the user
registry, you can configure user access to
features. To access the REST endpoints, a user
must be a member of a group that has the
i2:Administrator
permission under
command access control. For more information, see
Configuring command access control.