
Managing permissions effectively within business rules is increasingly important for our customers. To address their customer feedback and enhance control over business rules , we are launching an upgrade to our authorization concept for working with business rules with 1H 2025.
Previously, the "Metadata Framework → Configure Business Rules" permission was too broad, making it impossible to differentiate between viewing and editing rules, or restricting access to rules for specific applications, such as time management.
Leveraging Role-Based Permissions (RBP), the new concept provides the necessary granularity and ensures users gain precise access, allowing them to manage rules only within their authorized business areas. This enhances security and operational efficiency. Having said that, let's look into the details.
When working with a secured business rule object, it's essential to ensure proper maintenance and configuration.
The following steps are needed to secure your business rule object effectively and ensure system integrity.
To secure the business rule object, you must maintain its "Security" section within the Configure Object Definition.
Step 1: Ensure that you apply the following MANDATORY configurations:
Step 2: Optional, but recommended → Assigning a Permission Category
If the business rule object is correctly secured, the necessary permissions need to be granted. For existing customers, this means that the permission roles need to be updated. You can find the permission roles that already grant permissions to work with business rules by using our new Check Tool check. I’ll describe that a bit later.
When the business rule object is secured, it is essential to grant the appropriate permissions to users. Two mandatory (and one optional) permissions are required, based on the intended level of access for users.
Mandatory Permissions
Unlike other MDF objects, the Business Rules Object permissions deviate from standard time-dependent object permission behaviors. Though specific, granular actions can be assigned to time-dependent MDF objects, these are not applicable for a configuration object such as the business rule object; hence, we simplify permissions by distinguishing between only View and Edit.
To fine-tune authorization further, you may apply restrictions by setting Target Criteria in the Role Assignment. This allows specifying access to particular business areas, like granting Onboarding Business Admin permissions by selecting all Onboarding Scenarios.
When the business rule object is secured and configured with Role-Based Permissions, it significantly impacts various areas in the system.
Let’s dig into the details.
The Business Rules Admin page is the central entry point to work with business rules.
It provides a list of all rules that exist in the system. If the business rule object is secured, it can only be accessed if the user has the Configure Business Rules permission + (at least) View permission for the Business Rule object.
Unlike view and edit permissions, certain functionalities are not offered when only the view permission is granted. This includes:
If Edit & View or just View permissions are granted and, additionally, target criteria are restricted to certain scenarios, then:
Also, the Configure Business Rule page doesn’t offer certain functionalities if the user has view permissions only, which includes:
The only available action in the Take Action Menu that might be available if the user has just view permission is the Add to Transport Bundle action. This is a separate permission and not covered by the business rule object permissions at all.
Efficient rule assignment is facilitated within most of our applications UIs, offering intuitive ways to manage and engage with business rules.
Several UIs, such as the Manage Business Configuration UI in the screenshot below, feature options to create new rules (“+” icon) or view assigned rules (“Quick Card” icon) through a streamlined link to the Business Rules Framework, ensuring users have immediate access.
With the new authorization concept, these UIs react according to the granted permissions of the users.
The application UIs also react to the defined target criteria. For assigning rules, the field value help offers the list of rules that are allowed to be assigned, based on the rule scenario. If the user's role hasn’t been granted access to the expected scenario, the drop down list to select a rule will be empty.
For existing customers, deciding to add a new security level to Business Rules comes along with the need to find, review, and potentially adjust permission roles that already exist in the system.
To support that effort, we provide a new Check Tool check, designed to scan all existing roles, and find out the ones that might have been designed for working with business rules before.
Here's an in-depth look at this 2-stepped check:
As I mentioned in the very beginning, the new authorization concept comes with 2 main configuration prerequisites: First, securing the business rule object itself and second, granting the corresponding permissions. This is also reflected in a 2-stepped approach in the Check Tool check.
Step 1 verifies the security setup of the business rules object within the system:
Once the initial configuration is verified, the tool proceeds with Step 2 to examine all permission roles associated with business rules maintenance permissions:
If you are familiar with the Check Tool, you’ll probably know that some checks are designed to offer a so called “Quick Fix”. We thought about offering such a quick fix in case the check finds roles that violate the expected configuration. However, that would have meant providing all roles with the comprehensive permission to view and edit all business rules again, because we have no way of knowing how a customer has designed the role concept.
We decided against providing such a Quick Fix, as we think the decision to enable the security for the business rule object and benefit from the improved authorization options it offers should be an active decision taken by the customer
If you decide to secure the rules object and implement an enhanced permission concept for your company, you need to review your existing roles and decide which permissions these roles should be granted in the future.
Finally, I hope you agree that the new authorization concept for business rules provides the needed granularity and ensures that users can view or manage rules strictly within their authorized business areas. This enhances both security and operational efficiency.
I also hope you agree with our approach that system administrators must manage permissions proactively to align with the new setup. Proper configuration prevents unauthorized access and this needs to fit the very own customer permission role concept.
The introduction of a new check in the Check Tool is our support to review and adjust permission roles effectively to make the transition as smooth as possible.
And, if there are any open questions, please feel free to comment on this blog. I’d be happy to provide answers. Meanwhile, please check out our What’s New Viewer as well as our enhanced documentation (Permissions for Business Rules, Check Tool check ).
* To effectively utilize the "Manage Permission Roles" UI, users must have RBP Admin View access as a minimum. To actively modify permission roles, RBP Admin Edit permission is required. (Admin Center → “Manage Role-Based Permission Access.”)
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
7 | |
3 | |
3 | |
2 | |
2 | |
2 | |
1 | |
1 | |
1 | |
1 |