Redwood Documentation

Product Documentation

 

›Security Overview

RunMyJobsRunMyJobs On-Premises Installation

Preparing Installation

  • Preparation for Redwood Server Installation
  • Database Prerequisites
  • Basic Sizing Guidelines
  • Planning

Installation

  • Installation
  • Download and Extract redwood-platform.zip
  • Installing Redwood Platform
  • Redwood Platform Application Server
  • Licensing Redwood Server

Security Overview

  • Security Overview
  • Security in Redwood Platform
  • External Security Systems
  • Lightweight Directory Access Protocol (LDAP)
  • Configuring LDAP Manually
  • Configuring LDAP With the LDAP Wizard
  • Database Authentication
  • Database Authentication - Enforcing Password Policies
  • Configuring JEE Security

Configuration

  • Installing and Configuring Redwood Platform Service on Windows
  • Submitting Processes and Licensing on Startup
  • Configuring the HTTP or HTTPS Interface of Redwood Platform
  • Configuring the APR HTTPS Interface of Redwood Platform
  • Configuring the NIO HTTPS Interface of Redwood Platform
  • Importing a Certificate Authority
  • Checking Your License
  • Managing Your Licenses with the License Manager
  • Configuration
  • Configuration Entries

Starting Automatically

  • Starting Redwood Platform Automatically
  • Starting Redwood Platform Automatically with Systemd
  • Starting Redwood Platform Automatically with Init
  • Starting Redwood Platform Automatically with Launchd
  • Starting Redwood Platform Automatically on Solaris

High Availability

  • High Availability
  • Configuring Web Application Clusters for High Availability
  • Creating Redwood Platform Clusters
  • Configuring Web Application Clusters on Microsoft Cluster Service
  • Configuring Platform Agents for High Availability
  • Configuring Platform Agents on Microsoft Cluster Service

Upgrade

  • Upgrading Redwood Server
  • Upgrading Redwood Platform

Migration

  • Migrating Redwood Platform

Uninstall

  • Uninstalling Redwood Server

Reference

  • Standard setvars script
  • Admin Server
  • Checking Your License
← Security OverviewExternal Security Systems →

on-site-related topic Security in Redwood Platform

Redwood Platform authentication relies on an XML file, which contains both usernames and passwords in clear text.

warning

Redwood strongly recommends using LDAP or database security with Redwood Platform!

The Redwood Platform ships with the following core roles, which have been added to Redwood Platform:

  • scheduler-administrator - can perform all actions.
  • scheduler-isolation-administrator - can import and modify users.
  • scheduler-user - has access to Redwood Server only, cannot see any objects (always required, even for administrators).

You should add the following roles to your tomcat-users.xml file:

  • scheduler-bae-only-user - indicates that the user account is restricted to logging in via the SAP Inbound interface, only.
  • scheduler-event-operator - can raise and clear events, as well as all privileges assigned to scheduler-viewer.
  • scheduler-job-administrator - can create/edit/delete event definitions, process definitions, and chain definitions and modify both processes, and chains, as well as all privileges assigned to scheduler-event-operator.
  • scheduler-screen-reader - indicates that you are using a screen reader.
  • scheduler-viewer - read only access to all objects.

If you have purchased the Insight module, you will need the following as well:

  • scheduler-business-user - can access the business-user-centric user interface.
  • scheduler-it-user - can access the it-user-centric user interface.

Any new roles you need should be added to the XML file; Redwood Platform will have to be restarted, and a user needs to log in with that role before it can be used in Redwood Server.

Redwood Server Security

As soon as a user logs on to Redwood Server with one of the above roles, a user and/or role (if applicable) are created in the system with the same name.

Object and System Privileges can be granted to a user or a role.

System privileges are granted in the user or role object itself, object privileges are granted from the object itself, using the Security tab of the object.

  • Using Privileges
  • System Privileges
  • Object Privileges
  • Granting and Revoking System Privileges
  • Granting or Revoking Object Privileges
note

You can also assign privileges in the shell, if you have the Scripting Module, which requires the Module.Scripting license key.

Procedure

To add a new user:

  1. Open <install_dir>/j2ee/cluster/global/conf/tomcat-users.xml.
  2. Enter a new user tag containing the values below.
  3. Save the file and restart Redwood Platform.

Values

  • username - the user's login name
  • password - the user's password
  • roles - the privileges the user will have.

To assign a role to an existing user:

  1. Locate the line containing the entry for the user.
  2. Add the name of the role to the end of the list of roles, preceded by a comma.

Creating a custom role

  1. Open <install_dir>/j2ee/cluster/global/conf/tomcat-users.xml.
  2. Enter a new role tag containing a role name.
  3. Edit a user, and assign this role to the user.
  4. Save the file and restart Redwood Platform.
  5. Log in with the user you assigned the role to.

Editing a custom role

  1. Navigate to "Security > Roles".
  2. Choose Edit from the context-menu of an editable role. Editable roles have a description: Created automatically on first login.
  3. On the Assign Privileges tab, choose an Object definition and then Next.
  4. Choose the desired range of the privileges.
  5. Choose a Rank with the desired privileges. Admin privileges allow the user to perform the action and to grant the privilege to others as well. Access privileges allow the user to perform the actions.

Example:

Add the missing roles:

  <role rolename="scheduler-event-operator"/>
  <role rolename="scheduler-job-administrator"/>
  <role rolename="scheduler-viewer"/>
  <role rolename="scheduler-screen-reader"/>

Adding jdoe to your tomcat-users.xml file:

<user username="jdoe" password="mysecret" roles="scheduler-user"/>

Add the scheduler-event-operator role to jdoe:

<user username="jdoe" password="mysecret" roles="scheduler-user,scheduler-event-operator"/>

onsiteTopic

← Security OverviewExternal Security Systems →
  • Redwood Server Security
  • Procedure
  • Values
  • Example:
Docs
Getting StartedInstallationFinance InstallationConcepts
TroubleshootingArchiving
Learn and Connect
Support Portal
BlogEventsResources
ISO/ IEC 27001 Information Security Management
Automate to be human

2023 All Rights Reserved |

Terms of Service | Policies | Cookies | Glossary | Third-party Software | Contact | Copyright | Impressum |