Qlik Sense Security Rules List
Qlik Sense Security Rules List
2017/03/03
Table of Contents
Read Only Security Rules............................................................................................................................................................................................................................. 2
App .......................................................................................................................................................................................................................................................... 2
Content Library ..................................................................................................................................................................................................................................... 3
Content ................................................................................................................................................................................................................................................... 4
Extension ................................................................................................................................................................................................................................................ 5
File Reference......................................................................................................................................................................................................................................... 5
Owned Resource..................................................................................................................................................................................................................................... 5
User (Service Account / Root Admin).................................................................................................................................................................................................... 6
Default Security Rules .................................................................................................................................................................................................................................. 7
Resources ................................................................................................................................................................................................................................................... 7
App .......................................................................................................................................................................................................................................................... 7
App Object .............................................................................................................................................................................................................................................. 7
Content Library ..................................................................................................................................................................................................................................... 8
Data Connection .................................................................................................................................................................................................................................... 8
Extension ................................................................................................................................................................................................................................................ 9
Stream .................................................................................................................................................................................................................................................... 9
Hub ....................................................................................................................................................................................................................................................... 10
Owned Resource................................................................................................................................................................................................................................... 10
Cloud Credentials ................................................................................................................................................................................................................................ 11
On-Demand App Generation (ODAG) ................................................................................................................................................................................................ 11
Default Administrative User Group....................................................................................................................................................................................................... 12
Audit Admin ......................................................................................................................................................................................................................................... 12
Content Admin ..................................................................................................................................................................................................................................... 13
Deployment Admin .............................................................................................................................................................................................................................. 14
Security Admin .................................................................................................................................................................................................................................... 16
1
Read Only Security Rules
App
If you have read rights on the app you should be able to read app data segments belonging to that app
Name Resource filter Conditions Context Actions
ReadAppDataSegments App.DataSegment_* resource.App.HasPrivilege("read") and !user.IsAnonymous() Both in hub and QMC Read
If you have update rights on the app you should be able to create/update/read/delete app data segments belonging to that app
Name Resource filter Conditions Context Actions
UpdateAppDataSegments App.DataSegment_* resource.App.HasPrivilege("update") and !user.IsAnonymous() Both in hub and QMC Create
Read
Update
Delete
If you have read rights on the app you should be able to read app internals belonging to that app
Name Resource filter Conditions Context Actions
If you have update rights on the app you should be able to create/update/read/delete app internals belonging to that app
Name Resource filter Conditions Context Actions
Read
Update
Delete
2
If you have read rights on the app you should be able to read app content belonging to that app
Name Resource filter Conditions Context Actions
If you have update rights on the app you should be able to update app content belonging to that app
Name Resource filter Conditions Context Actions
Allows everyone that can see an app to see it's content files
Name Resource filter Conditions Context Actions
Allows everyone that can update an app to manage it's content files
Name Resource filter Conditions Context Actions
Read
Update
Delete
Content Library
Allows everyone that can see a content library to see its corresponding files
Name Resource filter Conditions Context Actions
Content library content StaticContentReference_* resource.ContentLibrarys.HasPrivilege("Read") Both in hub and QMC Read
3
Allows everyone that can update a content library to manage its corresponding files
Name Resource filter Conditions Context Actions
Content library manage content StaticContentReference_* resource.ContentLibrarys.HasPrivilege("Update") Both in hub and QMC Create,
Read
Update
Delete
Content
Allows everyone to read installed static content
Name Resource filter Conditions Context Actions
Installed static content StaticContentReference_* ((resource.StaticContentSecurityType="Open")) Both in hub and QMC Read
Allows everyone that can see a shared content to see its corresponding files
Name Resource filter Conditions Context Actions
Shared content see content StaticContentReference_* resource.SharedContents.HasPrivilege("Read") Both in hub and QMC Read
Allows everyone that can update a shared content to manage its corresponding files
Name Resource filter Conditions Context Actions
Shared content manage content StaticContentReference_* resource.SharedContents.HasPrivilege("Update") Both in hub and QMC Create
Read
Update
Delete
4
Extension
Allows everyone that can see an extension to see its corresponding files
Name Resource filter Conditions Context Actions
Extension static content StaticContentReference_* resource.Extensions.HasPrivilege("Read") Both in hub and QMC Read
Allows everyone that can update an extension to manage its corresponding files
Name Resource filter Conditions Context Actions
Extension manage content StaticContentReference_* resource.Extensions.HasPrivilege("Update") Both in hub and QMC Create,
Read
Update
Delete
File Reference
Everyone is allowed to read file references
Name Resource filter Conditions Context Actions
Owned Resource
The owner of a resource should be able to see the resource if it is published to a stream
Name Resource filter Conditions Context Actions
OwnerRead * resource.IsOwned() and resource.owner = user Both in hub and QMC Read
5
User (Service Account / Root Admin)
The service accounts should be able to do all actions
Name Resource filter Conditions Context Actions
ServiceAccount * ((user.UserDirectory="INTERNAL" and user.UserId like "sa_*")) Both in hub and QMC Create
Read
Update
Delete
Export
Publish
Change owner
Change role
Export data
Read
Update
Delete
Export
Publish
Change owner
Change role
Export data
6
Default Security Rules
Resources
App
Everyone is allowed to create apps except anonymous users
Name Resource filter Conditions Context Actions
Everyone is allowed to export the app data they are allowed to see except anonymous users
Name Resource filter Conditions Context Actions
The user should see the resource if he/she has read access to the stream it is published to
Name Resource filter Conditions Context Actions
Stream App* (resource.resourcetype = "App" and resource.stream.HasPrivilege("read")) or Both in hub and QMC Read
App Object
If you have read rights on an published app you should be able to create sheets, stories, bookmarks and snapshots belonging to that app
Name Resource filter Conditions Context Actions
7
If you have read rights on an unpublished app you should be able to create app objects belonging to that app
Name Resource filter Conditions Context Actions
Content Library
The default content library should be visible for all users
Name Resource filter Conditions Context Actions
Default content library ContentLibrary_365cddf2-1181-4204-8800- true Both in hub and QMC Read
e9a46fe3b127
Data Connection
It should be possible to create data connections except of type folder
Name Resource filter Conditions Context Actions
FolderDataConnection DataConnection_* resource.type = "folder" and (user.roles = "RootAdmin" or Only in hub Create
Update
Delete
8
Data connection used for uploading files to server
Name Resource filter Conditions Context Actions
File upload connection object DataConnection_47a1cfd8-f70e-4a98-a00d-00fca6c !user.IsAnonymous() Both in hub and QMC Read
8e253
Extension
Everyone can view extensions
Name Resource filter Conditions Context Actions
Stream
The default stream called Everyone should be visible for all users and all users should be able to publish to it
Name Resource filter Conditions Context Actions
Publish
The default stream called Everyone should be visible for anonymous users
Name Resource filter Conditions Context Actions
RootAdmin, ContentAdmin and SecurityAdmin should be able to publish to the default stream called Monitoring apps
Name Resource filter Conditions Context Actions
user.roles="SecurityAdmin"))
9
The default stream called Monitoring apps should be visible for default Administrators
Name Resource filter Conditions Context Actions
user.roles="AuditAdmin"))
Hub
Allows all users to access all hub sections
Name Resource filter Conditions Context Actions
Owned Resource
The owner of a resource should be able to do Update and Delete actions if the resource is not published to a stream
Name Resource filter Conditions Context Actions
Owner * resource.IsOwned() and (resource.owner = user Both in hub and QMC Update
OwnerPublish App_*,Stream_* resource.IsOwned() and resource.owner = user Both in hub and QMC Publish
The owner of an app object should be able to publish an object unless it is approved
Name Resource filter Conditions Context Actions
OwnerPublishAppObject App.Object_* resource.IsOwned() and resource.owner = user and resource.approved = "false" Both in hub and QMC Publish
10
Cloud Credentials
The user should be able to create cloud credentials for the stream he/she has create access to
Name Resource filter Conditions Context Actions
CreateCloudCredentials CloudCredentials_* (resource.stream.HasPrivilege("create") and !user.IsAnonymous()) Both in Hub and in QMC Create
The user should see cloud credentials if he/she has read access to the stream they are related to
Name Resource filter Conditions Context Actions
ReadCloudCredentials CloudCredentials_* (resource.stream.HasPrivilege("read") and !user.IsAnonymous()) Both in Hub and in QMC Read
resource.templateApp.HasPrivilege("read"))
Non-anonymous users with update access to the selectionApp and read access to the link can create OdagLinkUsages
Name Resource filter Conditions Context Actions
resource.link.HasPrivilege("read"))
Non-anonymous users with read access to the link can create new Requests using that link
Name Resource filter Conditions Context Actions
11
Non-anonymous users with read access to any selection app using the ODAG link can read the link
Name Resource filter Conditions Context Actions
Non-anonymous users with read access to the selection app and link can read an OdagLinkUsage
Name Resource filter Conditions Context Actions
resource.link.HasPrivilege("read"))
g,QmcSection_Audit
12
Content Admin
Content admin should have access rights to content related entities
Name Resource filter Conditions Context Actions
SchemaEvent_*,User*,CustomProperty*,Tag_*, Read
DataConnection_*,CompositeEvent_*,Extensio Update
n_*,ContentLibrary_* Delete
Export
Publish
Change owner
Stream,QmcSection_App,QmcSection_App.
Object,QmcSection_DataConnection,QmcSe
ction_Tag,QmcSection_User,QmcSection_C
ustomPropertyDefinition,QmcSection_Task,
QmcSection_Event,QmcSection_SchemaEv
ent,QmcSection_CompositeEvent,QmcSecti
on_Extension,QmcSection_ReloadTask,Qmc
Section_UserSyncTask,QmcSection_Conten
tLibrary,QmcSection_Audit
13
Content admin should have access rights to manage security rules for streams, data connections, content libraries and extensions
Name Resource filter Conditions Context Actions
ContentAdminRulesAccess SystemRule_* user.roles = "ContentAdmin" and resource.category = "Security" and Only in QMC Create
matches "ContentLibrary_¥w{8}-¥w{4}-¥w{4}-¥w{4}-¥w{12}" or
resource.resourcefilter matches
"Extension_¥w{8}-¥w{4}-¥w{4}-¥w{4}-¥w{12}")
Deployment Admin
Deployment admin should have access rights to deployment related entities
Name Resource filter Conditions Context Actions
_*,Engine*,Proxy*,VirtualProxy*,Repository Read
*,Printing*,Scheduler*,User*,CustomProper Update
ty*,Tag_*,License*,TermsAcceptance_*,Rel Delete
oadTask_*,UserSyncTask_*,SchemaEvent
_*,CompositeEvent_*
Deployment admin should have access rights to see and update apps in order to handle sync rules
Name Resource filter Conditions Context Actions
Update
14
Deployment admin should have access rights to deployment related sections
Name Resource filter Conditions Context Actions
ction_Tag,QmcSection_Templates,QmcSection_Service
Cluster,QmcSection_ServerNodeConfiguration,QmcSec
tion_EngineService,QmcSection_ProxyService,QmcSe
ction_VirtualProxyConfig,QmcSection_RepositoryServic
e,QmcSection_SchedulerService,QmcSection_Printing
Service,QmcSection_License*,QmcSection_Token,Loa
dbalancingSelectList,QmcSection_User,QmcSection_U
serDirectory,QmcSection_CustomPropertyDefinition,Q
mcSection_Certificates,
QmcSection_Certificates.Export,QmcSection_Task,Qm
cSection_App,QmcSection_SyncRule,QmcSection_Loa
dBalancingRule,QmcSection_Event,
QmcSection_ReloadTask, QmcSection_UserSyncTask,
QmcSection_Audit
Deployment admin should have access rights to manage sync and license rules
Name Resource filter Conditions Context Actions
Update
Delete
15
Security Admin
Security admin should have access rights to security related entities
Name Resource filter Conditions Context Actions
mProperty*,Tag_*,DataConnection_*,ContentLibrary_* Read
Update
Delete
Publish
Change owner
tream,QmcSection_App,QmcSection_App.Object,QmcSection
_SystemRule,QmcSection_DataConnection,QmcSection_Tag,
QmcSection_Templates,QmcSection_Audit,QmcSection_Prox
yService,QmcSection_VirtualProxyConfig,QmcSection_User,Q
mcSection_CustomPropertyDefinition,QmcSection_Certificates
,QmcSection_Certificates.Export,QmcSection_ContentLibrary
16