API Permissions

This section contains an overview of all the available permissions a principal (user or api client) can possess in the application and their description. The global permissions exist globally in contrast to the other types of permissions that exist and are valid only conditionally on specific resources. For example, a user can have a Realm Permission for Realm A, but not for Ream B. In the endpoint description of each endpoint, a section is dedicated to the required permissions for that specific endpoint. These permissions are to be understood such that they apply to the involved resources during the call, inputs and outputs for example.

Global Permissions

Global permissions are not linked to a specific resource

Permission Description

ADMIN

Full permissions for all Realms and belonging resources (Policies, End Entities, Certificate Requests, Certificates), as well as full User/API Client permissions and maintenance operation(deletion of archived entities)

REALMS_FULL_READ

Permission to read all Realms and belonging resources (Policies, End Entities, Certificate Requests, Certificates)

REALMS_CREATE

Permission to create Realms

APICLIENTS_READ

Permission to read all API Clients

APICLIENTS_CREATE

Permission to create API Clients

APICLIENTS_UPDATE

Permission to update API Clients (name, default policy, …​)

APICLIENTS_DELETE

Permission to delete API Clients

USERS_READ

Permission to read all Users

USERS_CREATE

Permission to create Users

USERS_UPDATE

Permission to update Users (name, email, …​)

Realm Permissions

Realm permissions are always assigned to a specific Realm, specified by the Realm ID

Permission Description

FULL_READ

Permission to read the Realm and belonging resources (Policies, End Entities, Certificate Requests, Certificates)

READ

Permission to read the Realm

UPDATE

Permission to update and archive the Realm

POLICIES_READ

Permission to read all Policies within the Realm

POLICIES_CREATE

Permission to create Policies within the Realm

POLICIES_UPDATE

Permission to update Policies within the Realm

POLICIES_CERTS_READ

Permission to read all Certificates and Certificate Requests within the Realm

POLICIES_CERTS_CREATE

Permission to create Certificates/Certificate Requests within the Realm

POLICIES_CERTS_REVOKE

Permission to revoke a Certificate within the Realm. If your intended use case is to revoke all certificates in a realm, please also additionally set the FULL_READ permission to the user/api client.

POLICIES_CERTREQS_APPROVE

Permission to approve/decline a Certificate Request within the Realm

ENDENTITIES_READ

Permission to read all End Entities within the Realm

ENDENTITIES_CREATE

Permission to create End Entities within the Realm

ENDENTITIES_UPDATE

Permission to update End Entities within the Realm

Policy Permissions

Policy permissions are always assigned to a specific Policy, specified by the Policy ID

Permission Description

READ

Permission to read the Policy

UPDATE

Permission to update and archive the Policy, required for End Entity Password operations

CERTS_READ

Permission to read all Certificates and Certificate Requests connected with the policy

CERTS_CREATE

Permission to create a Certificate Request connected with the Policy

CERTS_REVOKE

Permission to revoke a Certificate connected with the Policy

CERTREQS_APPROVE

Permission to approve/decline Certificate Requests connected with the Policy

End Entity Permissions

End Entity permissions are always assigned to a specific End Entity, specified by the End Entity ID

Permission Description

READ

Permission to read the End Entity and set End Entity alias

UPDATE

Permission to update and archive the End Entity, required for end entity password operations

Certificate Permissions

Certificate Request permissions are always assigned to a specific Certificate Request, specified by the Certificate Request ID

Permission Description

READ

Permission to read the Certificate

REVOKE

Permission to revoke/decline and archive the Certificate

Certificate Request Permissions

Certificate permissions are always assigned to a specific Certificate, specified by the Certificate ID

Permission Description

READ

Permission to read the Certificate Request

APPROVE

Permission to approve/decline and archive the Certificate Request