It is fine for me but if we treat them as demo data, we will need (as Hans 
suggested in another thread) a "system" group for the "system" userlogin wit 
super permissions as seed data.

Jacopo

On Jun 19, 2012, at 10:59 AM, Adrian Crum wrote:

> I prefer those names too.
> 
> Btw, from my perspective, the security groups and their permission 
> assignments should be demo data. The only security data the applications 
> really need are the permissions. Security groups are there for demonstration 
> purposes, and most organizations will create their own. Maybe we can discuss 
> that in another thread.
> 
> -Adrian
> 
> On 6/19/2012 7:50 AM, Jacopo Cappellato wrote:
>> Thanks to both of you (Hans for the clear definition of the problem, 
>> requirements and proposed solution; Adrian for the additional suggestions); 
>> I like the general idea but please see one minor comment inline:
>> 
>> On Jun 19, 2012, at 8:00 AM, Hans Bakker wrote:
>> 
>>> Thank you Adrian for the reply,
>>> 
>>> So, can we split the security files into 2 separate files?
>>> 
>>> xxxxxSecuritySeedData.xml containing the SecurityPermission and is 'seed' 
>>> data.
>>> xxxxxSecurityData.xml containing the SecurityGroup and 
>>> SecurityGroupPermission data which is 'seed-initial' data
>> Can we use the following naming conventions instead:
>> 
>> xxxxxSecurityPermissionData.xml containing the SecurityPermission; loaded as 
>> 'seed' data.
>> xxxxxSecurityGroupData.xml containing the SecurityGroup and 
>> SecurityGroupPermission data; loaded as 'seed-initial' data
>> 
>> ?
>> 
>> Kind regards,
>> 
>> Jacopo
>> 
>>> This change should not have any impact on the current functioning of the 
>>> system except for the fact that security seed data will not overwrite 
>>> group/permission assignments which are set by the menus after installation.
>>> 
>>> any comments?
>>> 
>>> Regards,
>>> Hans
>>> 
>>> 
>>> On 06/18/2012 05:50 PM, Adrian Crum wrote:
>>>> Then maybe the security group definitions and their permission assignments 
>>>> should be moved to the seed-initial reader.
>>>> 
>>>> -Adrian
>>>> 
>>>> On 6/18/2012 11:23 AM, Hans Bakker wrote:
>>>>> Adrian, i tried this way, i gave up on that, lets keep it simple?
>>>>> 
>>>>> i just want this use case problem solved:
>>>>> 
>>>>> as an ofbiz end user i want to be able to change the 
>>>>> securitygroup/permission assignment without it are being modified by 
>>>>> loading seed data.
>>>>> 
>>>>> Can you suggest a solution?
>>>>> 
>>>>> Regards,
>>>>> Hans
>>>>> 
>>>>> 
>>>>> On 06/18/2012 04:54 PM, Adrian Crum wrote:
>>>>>> I believe this is a problem with multi-tenant installations, correct? 
>>>>>> Could you go into more detail about the process? It appears to me the 
>>>>>> process is something like this:
>>>>>> 
>>>>>> 1. Deploy OFBiz in multi-tenant mode.
>>>>>> 2. Start adding tenants, configure permissions for each tenant.
>>>>>> 3. Install seed data. Seed data overwrites existing permission 
>>>>>> assignments - undoing the per-tenant permission settings.
>>>>>> 
>>>>>> Is that correct?
>>>>>> 
>>>>>> -Adrian
>>>>>> 
>>>>>> On 6/18/2012 10:11 AM, Hans Bakker wrote:
>>>>>>> perhaps confusing again, another try:
>>>>>>> 
>>>>>>> as an ofbiz end user i want to be able to change the 
>>>>>>> securitygroup/permission assignment without it are being modified by 
>>>>>>> loading seed data.
>>>>>>> 
>>>>>>> let me know what now is not clear....
>>>>>>> 
>>>>>>> regards,
>>>>>>> Hans
>>>>>>> 
>>>>>>> On 06/18/2012 04:03 PM, Hans Bakker wrote:
>>>>>>>> Ok the use case:
>>>>>>>> 
>>>>>>>> as a system end user i want to be able to change the 
>>>>>>>> securitygroup/permission assignment without they are being reset by 
>>>>>>>> loading seed data.
>>>>>>>> 
>>>>>>>> would this help?
>>>>>>>> 
>>>>>>>> Regards,
>>>>>>>> Hans
>>>>>>>> 
>>>>>>>> On 06/18/2012 04:00 PM, Adrian Crum wrote:
>>>>>>>>> Hans,
>>>>>>>>> 
>>>>>>>>> It would help if we had a description of the use case - so that we 
>>>>>>>>> can decide if the solution you are proposing is appropriate. I know 
>>>>>>>>> you described the use case before, but could you try again with more 
>>>>>>>>> detail? I had a difficult time understanding the problem you are 
>>>>>>>>> trying to solve.
>>>>>>>>> 
>>>>>>>>> -Adrian
>>>>>>>>> 
>>>>>>>>> On 6/18/2012 9:42 AM, Hans Bakker wrote:
>>>>>>>>>> Ok lets have another attempt om changing the security xml data 
>>>>>>>>>> perhaps in some smaller steps.
>>>>>>>>>> 
>>>>>>>>>> All components have xxxSecurityData.xml 'seed' files. Theses files 
>>>>>>>>>> contain security groups, security permissions and relations between 
>>>>>>>>>> these two entities. Security permissions are real seed data, there 
>>>>>>>>>> are related to hardcoded business functions inside the programs.
>>>>>>>>>> 
>>>>>>>>>> Security groups and the relation to permissions however are not seed 
>>>>>>>>>> data because they could be changed in production by the menus and 
>>>>>>>>>> then they are overwritten by the load-seed action.
>>>>>>>>>> Isn't it so that Load-seed should always be possible without 
>>>>>>>>>> destroying setting by users, so not overwrite the permission group 
>>>>>>>>>> allocation?
>>>>>>>>>> 
>>>>>>>>>> Suggestion to solve:
>>>>>>>>>> Moving the security groups and the relations to permissions in 
>>>>>>>>>> separate files and give them a different reader type (security?)
>>>>>>>>>> 
>>>>>>>>>> Problems:
>>>>>>>>>> 1. when only seed is loaded all components are not accessible 
>>>>>>>>>> because the security groups are missing.
>>>>>>>>>> 2. background jobs fail because security group FULLADMIN does not 
>>>>>>>>>> exist.
>>>>>>>>>> 
>>>>>>>>>> These 2 problems can be solved by creation of a 'system' security 
>>>>>>>>>> group related with a system userid with the same access as FULLADMIN 
>>>>>>>>>> but which is loaded as seed data.
>>>>>>>>>> 
>>>>>>>>>> Is this an acceptable solution?
>>>>>>>>>> 
>>>>>>>>>> Regards,
>>>>>>>>>> Hans

Reply via email to