8.4.15
Fields: Principals

See the associated 4.19 Principals resource section for more information on how to use this resource and supported operations.
Additional References
Type | Value | Additional Information |
---|---|---|
Permissions resource | principals | Permissions |
Hooks filename | principals.groovy | Pre- and Post-Processing Hooks |
Distinct query-supported | Yes | Distinct |

A principal maps to a set of ldap users, ldap groups, pam users, and/or pam groups. MWS roles are attached to the principals to authorize the group to use the specific MWS roles.
Field Name | Type | POST | PUT | Description |
---|---|---|---|---|
id | String | No | No |
The unique ID of this principal. |
attachedRoles | Set<Role> | Yes | Yes |
The MWS roles this principal is authorized to use. |
description | String | Yes | Yes |
The principal description. |
groups | List<Map> | Yes | Yes |
The groups associated with this principal. Each group has a name and a type. The valid types of groups are LDAPOU, LDAPGROUP, and PAMGROUP. Example group: |
name | String | Yes | Yes |
The unique human-readable name of this principal. Required during POST. |
users | List<Map> | Yes | Yes |
The users associated with this principal. Each user has a name and type. The valid types of users are LDAP and PAM. Example user: |
A role defines a set of permissions that are based on the proxy-user. If no proxy user is specified then access to objects in MWS are limited to its application permissions. For example if the application has permission to update all resources in MWS and no proxy-user is specified in the request then the request can access all resources in MWS.
Field Name | Type | POST | PUT | Description |
---|---|---|---|---|
id | String | No | No |
The unique ID of this role. |
description | String | Yes | Yes |
The role description. |
name | String | Yes | Yes |
The unique human-readable name of this role. Required during POST. |
permissions | List<Permission> | Yes | Yes |
The set of permissions enforced based on the proxy-user. |
Represents a permission.

A principal maps to a set of ldap users, ldap groups, pam users, and/or pam groups. MWS roles are attached to the principals to authorize the group to use the specific MWS roles.
Field Name | Type | POST | PUT | Description |
---|---|---|---|---|
id | String | No | No |
The unique ID of this principal. |
attachedRoles | Set<Role> | Yes | Yes |
The MWS roles this principal is authorized to use. |
description | String | Yes | Yes |
The principal description. |
groups | List<Map> | Yes | Yes |
The groups associated with this principal. Each group has a name and a type. The valid types of groups are LDAPOU, LDAPGROUP, and PAMGROUP. Example group: |
name | String | Yes | Yes |
The unique human-readable name of this principal. Required during POST. |
users | List<Map> | Yes | Yes |
The users associated with this principal. Each user has a name and type. The valid types of users are LDAP and PAM. Example user: |
A role defines a set of permissions that are based on the proxy-user. If no proxy user is specified then access to objects in MWS are limited to its application permissions. For example if the application has permission to update all resources in MWS and no proxy-user is specified in the request then the request can access all resources in MWS.
Field Name | Type | POST | PUT | Description |
---|---|---|---|---|
id | String | No | No |
The unique ID of this role. |
description | String | Yes | Yes |
The role description. |
name | String | Yes | Yes |
The unique human-readable name of this role. Required during POST. |
permissions | List<Permission> | Yes | Yes |
The set of permissions enforced based on the proxy-user. |
Represents a permission.
Related Topics