Identity Director Administration Guide


Configure permissions for Administrative Roles

In the Management Portal at Setup > Administrative Roles, prevent unauthorized access to the Management Portal and Setup and Sync Tool.

On the Administrative Roles tab, click an administrative role to configure its permissions. This determines what the login account to which it is assigned is allowed to do.

Permissions Explanation and Tips
Deny Select Deny to hide the item. By default, the access permissions of a new administrative role are set to Deny.
Read Select Read to set read-only access (available for services, people, organizational context and data connections).
Modify Select Modify to grant full access.
Inherit Select Inherit (blank) to let items inherit the access permissions of their parent (available for data connections, organizational context and services).

Please note, that the permissions of the default administrative role Full Access cannot be changed.

  • The Building Block functionality is only available if your login account has been assigned the Full Access role. Other administrative roles, including ones that grant Modify access to all functionality, do not grant access to the Building Block functionality.
  • Similarly, you can only synchronize data connections via a command line if your login account has been assigned the Full Access role.

Access to restricted information

With the item Eye Attribute Value Visibility, you can specify permissions to view Restricted information in text and table service attributes, text and table people attributes and people identifiers. This includes any related placeholders. These values are shown as Evil eye to administrators that do not have this permission.
This functionality applies to the Management Portal only; restricted information is still shown in the Web Portal.

Eye Attribute Value Visibility does not influence:

  • the ability to modify restricted data
  • the ability to change restricted data to unrestricted data

Multiple administrative roles

If you assign multiple administrative roles to a login account, the permissions of all roles are combined, in which the least restrictive permissions apply:

  • Modify takes precedence over Read and Deny
  • Read takes precedence over Deny
See also

Was this article useful?