<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Best Practice for Restricting Role-Based ACLs to Specific Lifecycle States in Windchill Customization</title>
    <link>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970645#M8671</link>
    <description>&lt;P&gt;Hello PTC Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’ve configured &lt;STRONG&gt;Role A&lt;/STRONG&gt; at the organization level to allow users to read and download content only in release-equivalent lifecycle states. However, I’ve encountered an issue where &lt;STRONG&gt;Role A&lt;/STRONG&gt; is inheriting the out-of-the-box (OOTB) ACLs assigned to the &lt;STRONG&gt;Team Member&lt;/STRONG&gt; role, which inadvertently grants users access (read and download) to objects in all lifecycle states.&lt;/P&gt;&lt;P&gt;What is the best practice for configuring ACLs so that &lt;STRONG&gt;Role A&lt;/STRONG&gt; can only access objects in release-equivalent lifecycle states, even when users are also assigned the &lt;STRONG&gt;Team Member&lt;/STRONG&gt; role? Any advice on managing role-based permissions effectively in this scenario would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Santosh&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Sep 2024 13:54:03 GMT</pubDate>
    <dc:creator>Santosh_B</dc:creator>
    <dc:date>2024-09-10T13:54:03Z</dc:date>
    <item>
      <title>Best Practice for Restricting Role-Based ACLs to Specific Lifecycle States</title>
      <link>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970645#M8671</link>
      <description>&lt;P&gt;Hello PTC Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’ve configured &lt;STRONG&gt;Role A&lt;/STRONG&gt; at the organization level to allow users to read and download content only in release-equivalent lifecycle states. However, I’ve encountered an issue where &lt;STRONG&gt;Role A&lt;/STRONG&gt; is inheriting the out-of-the-box (OOTB) ACLs assigned to the &lt;STRONG&gt;Team Member&lt;/STRONG&gt; role, which inadvertently grants users access (read and download) to objects in all lifecycle states.&lt;/P&gt;&lt;P&gt;What is the best practice for configuring ACLs so that &lt;STRONG&gt;Role A&lt;/STRONG&gt; can only access objects in release-equivalent lifecycle states, even when users are also assigned the &lt;STRONG&gt;Team Member&lt;/STRONG&gt; role? Any advice on managing role-based permissions effectively in this scenario would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Santosh&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 13:54:03 GMT</pubDate>
      <guid>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970645#M8671</guid>
      <dc:creator>Santosh_B</dc:creator>
      <dc:date>2024-09-10T13:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Restricting Role-Based ACLs to Specific Lifecycle States</title>
      <link>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970661#M8673</link>
      <description>&lt;P&gt;Note: This is not a customization question!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to achieve your use case, we should understand how access control works in Windchill, it is through &lt;STRONG&gt;access control calculation&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;Generally speaking, the strong rule will apply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let us know what do you mean by "&lt;SPAN&gt;&lt;U&gt;release-equivalent lifecycle states&lt;/U&gt;".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can start with the following documentation:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://www.ptc.com/en/support/article/CS364768?source=Bloop" target="_blank" rel="noopener"&gt;Article - CS364768 - Access Control Calculation in Windchill PLM (ptc.com)&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 14:19:15 GMT</pubDate>
      <guid>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970661#M8673</guid>
      <dc:creator>tarik_p</dc:creator>
      <dc:date>2024-09-10T14:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Restricting Role-Based ACLs to Specific Lifecycle States</title>
      <link>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970672#M8674</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Thank you for the clarification!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By "release-equivalent lifecycle states," I mean lifecycle states such as &lt;STRONG&gt;Released, Approved, or any custom states&lt;/STRONG&gt; that represent a state where the object is considered finalized or ready for general use, as opposed to states like &lt;STRONG&gt;In Work&lt;/STRONG&gt; or &lt;STRONG&gt;Under Review&lt;/STRONG&gt; where the object is still being developed or validated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will review the article you suggested on access control calculation (CS364768) to better understand how ACLs are applied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My goal is to ensure that users in &lt;STRONG&gt;Role A&lt;/STRONG&gt; can only access objects in release-equivalent states. However, the &lt;STRONG&gt;Team Member&lt;/STRONG&gt; role seems to override the ACL, granting broader OOTB permissions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’d appreciate any specific recommendations or best practices on how to override or fine-tune these permissions so that &lt;STRONG&gt;Role A&lt;/STRONG&gt; can have restricted access.&lt;/P&gt;&lt;P&gt;Thanks again for the guidance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Santosh&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 14:51:35 GMT</pubDate>
      <guid>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970672#M8674</guid>
      <dc:creator>Santosh_B</dc:creator>
      <dc:date>2024-09-10T14:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Restricting Role-Based ACLs to Specific Lifecycle States</title>
      <link>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970698#M8675</link>
      <description>&lt;P&gt;&lt;a href="https://www.ptcusercommunity.com/t5/user/viewprofilepage/user-id/494575"&gt;@Santosh_B&lt;/a&gt;&amp;nbsp;Try to set an absolute deny policy to this role A on the type of object in question for every state &lt;STRONG&gt;no&lt;/STRONG&gt; "&lt;SPAN&gt;release-equivalent states".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 16:10:52 GMT</pubDate>
      <guid>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970698#M8675</guid>
      <dc:creator>tarik_p</dc:creator>
      <dc:date>2024-09-10T16:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Restricting Role-Based ACLs to Specific Lifecycle States</title>
      <link>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970702#M8676</link>
      <description>&lt;P&gt;Thank you for the suggestion!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before implementing, I wanted to confirm if setting an absolute deny policy for &lt;STRONG&gt;Role A&lt;/STRONG&gt; on all non-release-equivalent states is a recommended approach by PTC. Additionally, I want to clarify that &lt;STRONG&gt;Role A&lt;/STRONG&gt; should only be able to access &lt;STRONG&gt;Parts, Documents, and CAD Documents&lt;/STRONG&gt;, and not any other objects.&lt;/P&gt;&lt;P&gt;Are there any potential implications or considerations I should be aware of when using this method?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for your guidance.&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Santosh&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 16:39:22 GMT</pubDate>
      <guid>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970702#M8676</guid>
      <dc:creator>Santosh_B</dc:creator>
      <dc:date>2024-09-10T16:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Restricting Role-Based ACLs to Specific Lifecycle States</title>
      <link>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970704#M8677</link>
      <description>&lt;P&gt;Try first with only one state and see if it does work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Absolute deny is a standard access control configuration, and it's used in many use cases.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The forbidden settings in access control are touching unmodifiable domains&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What remains is up to your design and approach, the better approach is to think of general access control architecture based on your current implementation and PTC best practices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;see:&amp;nbsp;&lt;A href="https://www.ptc.com/en/support/article/CS381802?source=Bloop" target="_blank"&gt;Article - CS381802 - Best Practices of Access Control Architecture in Windchill PLM (ptc.com)&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://www.ptc.com/en/support/article/CS406353?source=Bloop" target="_blank"&gt;Article - CS406353 - Optimization of Access Control Architecture in Windchill PDMLink (ptc.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 16:36:50 GMT</pubDate>
      <guid>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970704#M8677</guid>
      <dc:creator>tarik_p</dc:creator>
      <dc:date>2024-09-10T16:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Restricting Role-Based ACLs to Specific Lifecycle States</title>
      <link>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970708#M8678</link>
      <description>&lt;P&gt;Thank you for your suggestions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tested the deny and absolute deny configuration, and it works as expected for restricting &lt;STRONG&gt;Role A&lt;/STRONG&gt; to only view released objects. However, I also need &lt;STRONG&gt;Role A&lt;/STRONG&gt; to access only &lt;STRONG&gt;Parts, Documents, and CAD Documents&lt;/STRONG&gt;. Currently, they can still see other objects like &lt;STRONG&gt;Change Tasks&lt;/STRONG&gt; and &lt;STRONG&gt;Promotion Requests&lt;/STRONG&gt;. While I could manually deny access to these objects, this approach seems tedious and error-prone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I reviewed the articles provided, but they didn’t offer a clear solution for this specific scenario. Is there a more efficient way to limit access to only certain object types without having to manually configure denies for each additional object? Any guidance on how to streamline this would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Santosh&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 17:24:39 GMT</pubDate>
      <guid>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/970708#M8678</guid>
      <dc:creator>Santosh_B</dc:creator>
      <dc:date>2024-09-10T17:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Restricting Role-Based ACLs to Specific Lifecycle States</title>
      <link>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/971108#M8684</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://www.ptcusercommunity.com/t5/user/viewprofilepage/user-id/494575"&gt;@Santosh_B&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First, ACL knowledge&amp;nbsp; is really needed, because you can case many troubles to end users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would say, use different context template where the team member ACLs are not defined.&lt;/P&gt;
&lt;P&gt;or rearrange all ACLs to achieve your needs. Yes it takes a time &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check what ACL are defined on the TeamMembers pseudo role and deny this rules on your RoleA&lt;/P&gt;
&lt;P&gt;or remove the existing ACLs for the pseudo team role add this rules to individual roles that needs that rights.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is very complex area how to keep the ACLs rules in the best condition.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PetrH&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 12:57:18 GMT</pubDate>
      <guid>https://www.ptcusercommunity.com/t5/Windchill-Customization/Best-Practice-for-Restricting-Role-Based-ACLs-to-Specific/m-p/971108#M8684</guid>
      <dc:creator>HelesicPetr</dc:creator>
      <dc:date>2024-09-12T12:57:18Z</dc:date>
    </item>
  </channel>
</rss>

