OutSystems allows you to define the permissions of IT users by assigning them roles. When creating a new user, you need to assign a default role. This role defines the permissions the user has in each environment of your infrastructure.
By default, the role permissions apply to all applications. But you can then fine-tune the permissions for each application the user works on. Learn more about permission levels.
For example, you can grant a user permissions to list the applications on the Development environment. Then you can give the user permissions to change and deploy the Vacations application, both on Development and Quality Assurance. This allows the user to deploy the Vacations application from Development to Quality Assurance. But it also disallows the user to make changes to any other application.
Example security policy for small teams
By default, OutSystems has two roles that allow you to implement a simple security policy:
- Allows deploying to the Development environment, open applications on Quality Assurance, and list applications on Production.
- Allows deploying applications to all environments of the infrastructure and manage IT users, security, and environments.
With these roles you can make the following example configuration:
- Allow all developers to create and change applications on the Development environment.
- Have a release manager with the Administrator role. The release manager can deploy the applications to Quality Assurance and Production.
Example security policy for large teams
If the two default roles are not enough for your security policies, then create your own roles. Having more roles gives you more flexibility in controlling the permission levels of IT users.
In this example we have four roles, with increasing privileges:
- Can only open applications on Quality Assurance. This role cannot change anything.
- External Developer
- Can only change and deploy applications on the Development environment.
- Can change applications on Development and deploy them to Quality Assurance.
- Can deploy applications to all environments and manage users, security, and environments.
Example enterprise-grade security policy
To enforce stricter security policies, you can define IT user permissions for a specific application.
For this, assign IT users with a default role that has few privileges. Then, grant them access to specific applications. Do this by assigning them a role with higher permissions for each application.
In this example, Brooklyn's default role allows her to list the applications on Development. But for the Vacations application we assigned her the Developer role. This allows her to change the Vacations application on Development and nothing else.
Managing the permission each IT user has on each application can be difficult. This is even more complex when you have lots of applications or users. To help solve this, OutSystems allows you to define teams.
A team is a group of IT users that work on several related applications. When you add a user to a team, you can define the permissions the user has for those applications. You do this by assigning the user a role specific to the applications in the team.
This allows you to specify the permissions a user has for several applications at a time. You do not have to grant those permissions for each individual application.
In this example, John's default role only allows him to list applications on Development. But John's role in the Customer Portal team allows him to change and deploy all applications in this team. These applications are: Customer Portal, Cases, and CRM Services.
Articles in this Section
- Create an IT User
- Create IT users for new developers and operators that will operate the platform.
- Create an IT Role
- Grant your IT users permissions by assigning them roles.
- Create an IT Team
- Teams allow you to manage the permissions a number of IT users have for several applications.
- Grant IT Roles for a Specific Application
- Learn how to grant users with different roles regarding specific applications.
- Allow Managers to Handle Permissions of IT Teams
- Keep the control of the users and teams that are created, but delegate the permission management to the team manager.
- Find Out the Permissions of IT Users
- Ensure a strict security policy by checking the permissions IT users have over an application.
- About Permission Levels
- Learn the list of permission levels a role can have.