Fabric Credentials List Commands

The following table describes the methods to see the access control information using Fabric LIST commands.

LIST ROLES

Description: Retrives the list of roles, as stored at Fabric. 

To read more about creating roles see here

To read more about deleting roles see here

LIST SECURITY_PROFILES

Description: Retrives the list of securify profiles, as stored at Fabric. 

To read more about creating security profiles see here

LIST USERS

Description: List existing users along with their associated roles

Usage

LIST USERS [user_filter='<filter>'] [role_filter='<filter>']

Parameters:

  • user_filter='<filter>' – optional, when specified the result will show only users which match to the filter applied on the user name..
  • [description <'role description'>] – optional, when specified the result will show only users which match to the filter applied on the role name

The command filtering supports exact match as well as similarity filtering by using the '%' to sign wildcards.

Examples:

  • '%th' - retries names that ends with 'th'
    • When defined on user filter - retrieves users that their name ends with 'th'
    • When defined on role filter - retierves users that are assoicated to roles which then name ends with 'th'
  • 'jo%' = starts with 'jo' (by filter type as explained above)
  • '%smi%' = contains 'smi' (by filter type as explained above)
  • 'john smith' = exact match of 'john smith' (by filter type as explained above)
  • '%%' or without filters = all users

To read more about disassociate user from roles see here.

NOTE: Users as well as their associations to troles are not stored at Fabric when it is set to work with external identificationa and authentication providers, such as SAML or LDAP. Thus, this list will be empty (unless an admin was defined during system setup or when using fallbacks). For more information see here.

LIST ROLE_PERMISSIONS

Description: List of permissions per role and per resource.

The retrieved list is in a table form where each entry contains the role-name, method (the operation) and resource -name. Each permission is on a seprated entry. 

Example:

|role   |method|permissions|
+-------+------+-----------+
|admin |ALL |* |
|admin |ALL_WS|* |
|manager|DEPLOY|CRM |

 

To read more about permission granting capabilities see here.

To read more about revoking permissions see here.

LIST TOKENS

Description: List of tokens and their association to roles.

The retrieved list is in a table form where each entry contains the token-name, indication if it is secured, and associated role/s

Example:

|token|secured|roles                |
+-----+--------+-----------------+
|ABC  |false     |admin              |
|CBA  |true      |admin,manager|

 

To read more about create tokens see here.

To read more about associate token to role see here.

To read more about disassociate roles from tokens see here.

Previous

Fabric Credentials List Commands

The following table describes the methods to see the access control information using Fabric LIST commands.

LIST ROLES

Description: Retrives the list of roles, as stored at Fabric. 

To read more about creating roles see here

To read more about deleting roles see here

LIST SECURITY_PROFILES

Description: Retrives the list of securify profiles, as stored at Fabric. 

To read more about creating security profiles see here

LIST USERS

Description: List existing users along with their associated roles

Usage

LIST USERS [user_filter='<filter>'] [role_filter='<filter>']

Parameters:

  • user_filter='<filter>' – optional, when specified the result will show only users which match to the filter applied on the user name..
  • [description <'role description'>] – optional, when specified the result will show only users which match to the filter applied on the role name

The command filtering supports exact match as well as similarity filtering by using the '%' to sign wildcards.

Examples:

  • '%th' - retries names that ends with 'th'
    • When defined on user filter - retrieves users that their name ends with 'th'
    • When defined on role filter - retierves users that are assoicated to roles which then name ends with 'th'
  • 'jo%' = starts with 'jo' (by filter type as explained above)
  • '%smi%' = contains 'smi' (by filter type as explained above)
  • 'john smith' = exact match of 'john smith' (by filter type as explained above)
  • '%%' or without filters = all users

To read more about disassociate user from roles see here.

NOTE: Users as well as their associations to troles are not stored at Fabric when it is set to work with external identificationa and authentication providers, such as SAML or LDAP. Thus, this list will be empty (unless an admin was defined during system setup or when using fallbacks). For more information see here.

LIST ROLE_PERMISSIONS

Description: List of permissions per role and per resource.

The retrieved list is in a table form where each entry contains the role-name, method (the operation) and resource -name. Each permission is on a seprated entry. 

Example:

|role   |method|permissions|
+-------+------+-----------+
|admin |ALL |* |
|admin |ALL_WS|* |
|manager|DEPLOY|CRM |

 

To read more about permission granting capabilities see here.

To read more about revoking permissions see here.

LIST TOKENS

Description: List of tokens and their association to roles.

The retrieved list is in a table form where each entry contains the token-name, indication if it is secured, and associated role/s

Example:

|token|secured|roles                |
+-----+--------+-----------------+
|ABC  |false     |admin              |
|CBA  |true      |admin,manager|

 

To read more about create tokens see here.

To read more about associate token to role see here.

To read more about disassociate roles from tokens see here.

Previous