HomeGuidesRecipesAPI
HomeGuidesAPILog In

In the roles section, you can create roles that work for your organization. Create the Role Name, then select from the list of permission that this role should have. Role names are limited to 50 characters.

Custom roles can be created to set the security level for a user. When creating a new role there are various permissions that can be attached to that role.

PermissionDescription
Change settingsThis option allows the user to modify the settings of the SmartIQ site. When this permission is set to a user, that user will be able to see the settings menu in manage and can modify them. These permissions are best set for a role that only needs the ability to modify settings in manage.
Content approverThis option allows the user to approve changes to the content items in the content library. This role only applies when “Enable Content Approval” is enabled in settings.

Note: The user will need to have the “Manage content library’ permission set as well so that they can view the content library. This permission is best set for a role that needs the ability to approve content in the content library.
Design projectsThis option allows the user to create projects in design. This permission is best set for a role that only needs the ability to run SmartIQ design application.
Impersonate UsersThis option allows the user to impersonate other users in the client API.
Important: This permission should only be given to service accounts.
LicensingThis option grants permission to modify your SmartIQ licensing configuration.
Manage content libraryThis option allows the user to add and delete content library items. When this permission is set to a user, that user will be able to see the content library menu. This permission is best set for roles that need the ability to manage the content library.
Manage data connectionsThis option allows the user to create, edit or delete data connections. When this permission is set to a user, that user will be able to see the Data Connections menu. This permission is best set for a role that needs the ability to modify the data connections.
Manage groupsThis option allows the user to create, edit or delete groups. When this permission is set to a user, that user will be able to see the Groups menu. This permission is best set for a role that needs the ability to modify the groups in manage.
Manage securityThis option allows the user to create, edit or delete Roles which can be used to set the security for users. When this permission is set to a user, that user will be able to see the Roles menu. This permission is best set for a role that needs the ability to modify roles.
Manage usersThis option allows the user to manage the users for the environment. When this permission is set to a user, that user will be able to access the Users menu. This permission is best set for a role that needs the ability to manage the users for the SmartIQ environment.
Manage workflow tasksThis option allows the user to manage the workflow tasks for the SmartIQ environment. This is where you can view all workflow tasks as well as terminating and reassigning those tasks. This permission is best for a role that needs to manage the workflow.
Management consoleThis option allows the user to view the management console. This permission is best set for a role that needs the ability to view the management logs in manage.
Manage publish foldersThis option allows the user to manage folder access and publish projects. This permission is best set for a role that needs the ability to manage the folder access and can edit projects.
View event logThis option allows the user to view the logs for the different events that may occur. This role is best set for a user that needs to ability to view and troubleshoot errors in the system.

Enforce Two-Factor Authentication

It is possible to enforce 2FA by selecting it on a Role. Users that belong to this role, or a group that has this role, will be prompted to setup 2FA when they next login. Instructions will appear on the screen for the user to follow. If the user does not immediately activate 2FA, they will be prompted on their next attempt. The user will not be able to login without setting up 2FA.