Skip to main content

General

Security & Access Control

Comprehensive guide to User Management, Roles, and the advanced Permission System.

Proxus enforces a strict Role-Based Access Control (RBAC) architecture designed to secure complex organizational hierarchies. It goes beyond simple "Admin vs User" toggles, offering granular control down to individual object properties and navigation items.

User Management

The Users view is the central directory for all accounts.

User Management List
User Management List

Creating a User

  1. Navigate to Administration > Users.
  2. Click New.
  3. Fill in the required identity fields. The User Name is used for login.
  4. Set an initial Password (User will be prompted to change it if configured in policies).
  5. Assign one or more Roles. Permissions are additive (User gets the union of all assigned roles).

User Detail View
User Detail View

Authentication & SSO

Proxus supports multiple authentication strategies, including Local Database, Active Directory (On-Premise), and Azure AD (Cloud).

To learn how to integrate Proxus with your enterprise identity provider, see the Authentication Providers guide.


Role Management

Roles are the container for all permission logic. A well-structured role strategy reduces administrative overhead.

Role Management List
Role Management List

1. General Permissions (Type-Based)

This is the foundation of the security model. You define CRUD (Create, Read, Update, Delete) access for specific business objects (e.g., Device, Gateway, Report).

Role Type Permissions
Role Type Permissions

  • Read: Can view the object in lists and details.
  • Write: Can modify properties.
  • Create: Can instantiate new objects.
  • Delete: Can remove objects.
  • Navigate: Can see the object in the navigation menu.

Object-Level Security (Criteria)

Proxus allows you to restrict access to specific rows based on data values.

  • Example: Define a "Site Manager" role that has Read access to Device ONLY IF Site.Name == 'New York'.
  • This ensures a manager in New York never sees London's data, even though they share the same object type.

2. Navigation Permissions

You can explicitly hide or show items in the main sidebar menu, regardless of the underlying data access.

Role Navigation Permissions
Role Navigation Permissions

  • Allow: The menu item is visible.
  • Deny: The menu item is hidden. Use this to simplify the interface for operators (e.g., hiding "Administration" or "Developer API").

3. UNS Topic Permissions

This is specific to the Unified Namespace. It controls which nodes in the hierarchy tree are visible to the user.

Role UNS Topic Permissions
Role UNS Topic Permissions

See the detailed UNS Topic Permissions guide for configuration patterns.

4. Denied Actions

For scenarios where "Allow" rules are too broad, you can explicitly deny specific actions. This acts as a "hard stop" overriding other permissions.

Role Denied Actions
Role Denied Actions


Administrative Roles vs. Standard Roles

Proxus distinguishes between two administrative levels:

Role TypeCapabilities
AdministrativeHas the Is Administrative flag checked. Can manage other users, roles, and view all data by default (unless explicitly denied). Also has access to the Model Editor and low-level system configs.
StandardStarts with No Access. You must explicitly grant permissions to types, objects, and navigation items. Ideal for Operators, Viewers, and Site Managers.

Role Details
Role Details


Security Policies

Global security settings are managed via the Configuration Editor. These settings control compliance and protection across all authentication providers.

  • Password Complexity: Define minimum length, special characters, and history reuse policies in the [Security.Password] section.
  • Lockout Policy: Configure protection against brute-force attacks by limiting failed attempts in the [Security] section.
  • Session Timeout: Set auto-logout intervals for inactive users.
lightbulb
Centralized Config

Settings changed in the Configuration Editor require a service restart to take effect. For Docker deployments, these can also be set via Environment Variables.

priority_high
Best Practice

Always follow the Principle of Least Privilege. Start with a blank Standard Role and add only the necessary permissions. Avoid giving "Administrative" status unless absolutely required.