I prefer those names too.

Btw, from my perspective, the security groups and their permission assignments should be demo data. The only security data the applications really need are the permissions. Security groups are there for demonstration purposes, and most organizations will create their own. Maybe we can discuss that in another thread.

-Adrian

On 6/19/2012 7:50 AM, Jacopo Cappellato wrote:
Thanks to both of you (Hans for the clear definition of the problem, 
requirements and proposed solution; Adrian for the additional suggestions); I 
like the general idea but please see one minor comment inline:

On Jun 19, 2012, at 8:00 AM, Hans Bakker wrote:

Thank you Adrian for the reply,

So, can we split the security files into 2 separate files?

xxxxxSecuritySeedData.xml containing the SecurityPermission and is 'seed' data.
xxxxxSecurityData.xml containing the SecurityGroup and SecurityGroupPermission 
data which is 'seed-initial' data
Can we use the following naming conventions instead:

xxxxxSecurityPermissionData.xml containing the SecurityPermission; loaded as 
'seed' data.
xxxxxSecurityGroupData.xml containing the SecurityGroup and 
SecurityGroupPermission data; loaded as 'seed-initial' data

?

Kind regards,

Jacopo

This change should not have any impact on the current functioning of the system 
except for the fact that security seed data will not overwrite group/permission 
assignments which are set by the menus after installation.

any comments?

Regards,
Hans


On 06/18/2012 05:50 PM, Adrian Crum wrote:
Then maybe the security group definitions and their permission assignments 
should be moved to the seed-initial reader.

-Adrian

On 6/18/2012 11:23 AM, Hans Bakker wrote:
Adrian, i tried this way, i gave up on that, lets keep it simple?

i just want this use case problem solved:

as an ofbiz end user i want to be able to change the securitygroup/permission 
assignment without it are being modified by loading seed data.

Can you suggest a solution?

Regards,
Hans


On 06/18/2012 04:54 PM, Adrian Crum wrote:
I believe this is a problem with multi-tenant installations, correct? Could you 
go into more detail about the process? It appears to me the process is 
something like this:

1. Deploy OFBiz in multi-tenant mode.
2. Start adding tenants, configure permissions for each tenant.
3. Install seed data. Seed data overwrites existing permission assignments - 
undoing the per-tenant permission settings.

Is that correct?

-Adrian

On 6/18/2012 10:11 AM, Hans Bakker wrote:
perhaps confusing again, another try:

as an ofbiz end user i want to be able to change the securitygroup/permission 
assignment without it are being modified by loading seed data.

let me know what now is not clear....

regards,
Hans

On 06/18/2012 04:03 PM, Hans Bakker wrote:
Ok the use case:

as a system end user i want to be able to change the securitygroup/permission 
assignment without they are being reset by loading seed data.

would this help?

Regards,
Hans

On 06/18/2012 04:00 PM, Adrian Crum wrote:
Hans,

It would help if we had a description of the use case - so that we can decide 
if the solution you are proposing is appropriate. I know you described the use 
case before, but could you try again with more detail? I had a difficult time 
understanding the problem you are trying to solve.

-Adrian

On 6/18/2012 9:42 AM, Hans Bakker wrote:
Ok lets have another attempt om changing the security xml data perhaps in some 
smaller steps.

All components have xxxSecurityData.xml 'seed' files. Theses files contain 
security groups, security permissions and relations between these two entities. 
Security permissions are real seed data, there are related to hardcoded 
business functions inside the programs.

Security groups and the relation to permissions however are not seed data 
because they could be changed in production by the menus and then they are 
overwritten by the load-seed action.
Isn't it so that Load-seed should always be possible without destroying setting 
by users, so not overwrite the permission group allocation?

Suggestion to solve:
Moving the security groups and the relations to permissions in separate files 
and give them a different reader type (security?)

Problems:
1. when only seed is loaded all components are not accessible because the 
security groups are missing.
2. background jobs fail because security group FULLADMIN does not exist.

These 2 problems can be solved by creation of a 'system' security group related 
with a system userid with the same access as FULLADMIN but which is loaded as 
seed data.

Is this an acceptable solution?

Regards,
Hans

Reply via email to