“Settings/User settings/Authorization Management" should be used to create users and define authorizations and groups. On this page

Groups

LDAP/AD Integration

Manage Authorizations

You specify which authorizations are used for each group.

The authorization categories may vary depending on the installed modules. For example, with the MOBIDI Connector application module, the necessary categories related to MOBIDI Office are also added.

Authorizations are given to groups. The authorizations of users added/removed to groups are automatically updated.

(info) If no selection is made for any group, it is interpreted as no authorization and in this case the authorization button is unlocked.

Users

Users can come from the LDAP/AD side or be GEODI users.

Guest Users

If your license allows, you can create open GEODI projects with guest user definition. Guest users are a practical solution for informational projects such as the Ankara digital city archive or the Nigerian Ministry of Treasury projects.

You need to activate guest users in Settings. You also need to include them in a group and set the appropriate authorizations for your project. They will appear as "guest" in the user list.

Integration with Google and other authentication sources

GEODI can integrate with authentication sources such as Google, Facebook. Users can log in to the system with these authentication sources. There are ready definitions for Google, Dropbox, Linkedin, Facebook, Microsoft. You can find the required definition for each of them in GEODI/Settings/LoginProvider directory. To activate them, you need to change the extensions to jSettings.

The resources you activate will appear on the login page. You need to authorize users from these sources separately. You do this by including them in a group.

Select the group you want to authorize. If you type "*" in users and select Google, you will authorize all users coming from the google resource. If you replace "*" with a user's email address, you will only authorize that user.

Integration with Other Systems and SSO

GEODI infrastructure is also suitable for external user authentication services other than LDAP.

Can be integrated with other platforms used by organizations. It is sufficient to provide the services specified in Developers.decesoftware.com.

It can also be integrated with the user authentication features of services such as Facebook and Google.

Project-Based Permission

Permissions specific to the project are defined. If no permission is granted to any group, all users will have access to all permissions.

Resource-Based Permission

Resource-based authorizations can be set up within the project. If no permission is granted to any group, all users will have access to all permissions.

Can Search: Specifies who can see the relevant resource.

Can Share: Allows sharing from the Twitter account defined in GEODI.

Can View/Download: Grants permission to download and view files in the relevant resource to authorized users.

Can Add Notes: Permission to add notes to files and folders in the relevant resource.

Can Edit Others' Notes: Allows intervention in other users' notes.

Can Add/Feed: Allows uploading files to the relevant resource via the browser.

To view the permissions of a logged-in user and clear the permission cache in GEODI, the following steps can be applied.

Api → User Manager Api section.

  • UserInfoFull GetCurrentUserInfoWithPermissions() [RUN] → Click Run to view the permissions of the currently logged-in user.

  • Boolean ClearCurrentUserPermissionCache() [RUN] → Clears the permission cache. It can be used to reflect changes in permissions immediately.

Limit/Override SystemAdmin superuser permissions

bydefault System Admins are privilaged and has permission to see all content.

There is a way to override this behaviour. This settings will be affective throught for all workspaces.

Set IgnoreSystemAdminContentAccessPrivileges value to TRUE(default is FALSE) in SystemSettings file. Details are in https://support.decesoftware.com/space/DEV/1390184262/System+Configuration+-+Security+Settings

Then you must set the necessary permissions for each data source. The following example assumes a DPO grup and the members will be able to open, report and inspect all findings, but SystemAdmins can not. The source name is SG-43 here. This must be repeated for other sources as well.

(info)(info) Please note that, when all checkboxes are off, that means are all on(a situation at the very begining). But once you check a box, then everything behaves as expected and you should give permissions one by one. a

image-20240801-131320.png