Skip to main content
Completed

'NO_GRANT_TO_PUBLIC' on IAM

Related products:Intelligent Application Manager
Arjan Sollie
Jeroen van den Belt
Harm Horstman
Johan van Eijsden
+40
  • Andre te Raa
  • Arjan Sollie
    Arjan Sollie
  • Jeroen van den Belt
    Jeroen van den Belt
  • Harm Horstman
    Harm Horstman
  • Johan van Eijsden
    Johan van Eijsden
  • Edwin Saan
  • Mark Jongeling
    Mark Jongeling
  • Gert Groeneveld
    Gert Groeneveld
  • André Romijn
  • Hugo Nienhuis
    Hugo Nienhuis
  • Geurt
    Geurt
  • eurban
    eurban
  • Erwin Ekkel
  • Frank Junger
  • Remco Kort
    Remco Kort
  • Blommetje
    Blommetje
  • Arie V
    Arie V
  • Rafal Zaluski
    Rafal Zaluski
  • J. de Lange
    J. de Lange
  • mperrott
    mperrott
  • Tjerk
  • Suleyman
  • Marc Ferket
  • Jefferson Delacruz
  • Peter van Leenen
  • Shawn Adrian Diño
  • WarrenM
  • Jason Philip A Mortera
  • PeterKeeris
  • Maarten
  • ArnoW
    ArnoW
  • Kevin Rosink
    Kevin Rosink
  • Remco Duijsens
    Remco Duijsens
  • Marius Korff
    Marius Korff
  • Guido Bijl
    Guido Bijl
  • Mark_Plaggenborg
  • Johan
  • JC Bulaong
  • Max Ferket
  • Ionut
    Ionut
  • Mike C
  • nelsontenbrink
    nelsontenbrink
  • Steffen
  • sven.neuteboom
    sven.neuteboom
  • nick_de_ruiter

In our configuration, only the application pool user of indicium/indicium universal/webgui needs rights to the database, and we want it that way for the lowest possible security risk.

It is now possible to prevent rights to be given to the public role on the model database, so we have already achieved a certain degree of security. (https://docs.thinkwisesoftware.com/docs/kb/tags#limit-database-authorization-with-a-tag)

But it is not yet possible to achieve the same on the IAM database, while the IAM controls access to the model database.

So it is our wish, with new versions of IAM, that these are also delivered in such a way that rights are never distributed to the public role.

As an idea for a possible solution direction: As far as we are concerned, it may also be organized in such a way that the distribution of rights is arranged via 1 SQL script and that we ourselves prevent this sql script from being executed (for example, by means of a switch on the twdeployer.exe)

Did this topic help you find an answer to your question?

5 replies

Mark Jongeling
Administrator
Forum|alt.badge.img+23
NewOpen

Ester
Moderator
Forum|alt.badge.img+5
  • Moderator
  • 58 replies
  • October 19, 2023
OpenOn the backlog

Mark Jongeling
Administrator
Forum|alt.badge.img+23
On the backlogWorking on it!

Mark Jongeling
Administrator
Forum|alt.badge.img+23
Working on it!Next release
 

From 2024.1, IAM will be released without rights automatically being granted to the Public role.


Mark Jongeling
Administrator
Forum|alt.badge.img+23
Next releaseCompleted

Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings