<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to CIA</title><link>https://sourceforge.net/p/coils/wiki/CIA/</link><description>Recent changes to CIA</description><atom:link href="https://sourceforge.net/p/coils/wiki/CIA/feed" rel="self"/><language>en</language><lastBuildDate>Thu, 31 Oct 2013 13:36:55 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/coils/wiki/CIA/feed" rel="self" type="application/rss+xml"/><item><title>CIA modified by Adam Tauno Williams</title><link>https://sourceforge.net/p/coils/wiki/CIA/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v2
+++ v3
@@ -8,7 +8,7 @@

 ###getMaterializedRights

-getMaterializedRights allows a system administrator or work-flow administrator [permissions to perform the method is limited by those roles] to inquire as to what rights a given context has on a given object.  If a user should be granted acess to a project, for instance, the administrator can verify after changing ACLs or assignment that the user actually has the expected access.  Having the ability for trusted user's to visualize the rights granted on X to Y can faciliate the troubleshooting of access related issues; and access control provisions in the enterprise can be a complicated issue.
+getMaterializedRights allows a system administrator or work-flow administrator \[permissions to perform the method is limited by those [roles](Roles)\] to inquire as to what rights a given context has on a given object.  If a user should be granted acess to a project, for instance, the administrator can verify after changing ACLs or assignment that the user actually has the expected access.  Having the ability for trusted user's to visualize the rights granted on X to Y can faciliate the troubleshooting of access related issues; and access control provisions in the enterprise can be a complicated issue.

 ####Signature

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Tauno Williams</dc:creator><pubDate>Thu, 31 Oct 2013 13:36:55 -0000</pubDate><guid>https://sourceforge.netfefd671f55d3ba393d05661b7cbd994153ac159b</guid></item><item><title>CIA modified by Adam Tauno Williams</title><link>https://sourceforge.net/p/coils/wiki/CIA/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -7,6 +7,8 @@
 ##Methods

 ###getMaterializedRights
+
+getMaterializedRights allows a system administrator or work-flow administrator [permissions to perform the method is limited by those roles] to inquire as to what rights a given context has on a given object.  If a user should be granted acess to a project, for instance, the administrator can verify after changing ACLs or assignment that the user actually has the expected access.  Having the ability for trusted user's to visualize the rights granted on X to Y can faciliate the troubleshooting of access related issues; and access control provisions in the enterprise can be a complicated issue.

 ####Signature

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Tauno Williams</dc:creator><pubDate>Thu, 31 Oct 2013 13:35:26 -0000</pubDate><guid>https://sourceforge.net0ff42b139b86c66628c1f77e39e88c2018d7ba41</guid></item><item><title>CIA modified by Adam Tauno Williams</title><link>https://sourceforge.net/p/coils/wiki/CIA/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;&lt;a class="alink" href="/p/coils/tickets/search/?q=labels%3Azogi"&gt;[zOGI]&lt;/a&gt; &lt;a class="alink" href="/p/coils/wiki/Development/"&gt;[Development]&lt;/a&gt; &lt;a class="alink" href="/p/coils/wiki/Model/"&gt;[Model]&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="the-cia-namespace"&gt;The CIA Namespace&lt;/h1&gt;
&lt;p&gt;CIA stands for Coils Interrogation API.  This RPC namespaces hosts methods useful to system administrators, developers, and possibly help-desk staff, for interrogating the state of the server.&lt;/p&gt;
&lt;h2 id="methods"&gt;Methods&lt;/h2&gt;
&lt;h3 id="getmaterializedrights"&gt;getMaterializedRights&lt;/h3&gt;
&lt;h4 id="signature"&gt;Signature&lt;/h4&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span class="n"&gt;getMaterializedRights&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;context_id&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;&lt;span class="n"&gt;integer&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;object_id&lt;/span&gt;&lt;span class="o"&gt;::&lt;/span&gt;&lt;span class="n"&gt;integer&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;
&lt;h4 id="example-call"&gt;Example Call&lt;/h4&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span class="n"&gt;cia&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;getMaterializedRights&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1181110&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;29680&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;
&lt;h4 id="response"&gt;Response&lt;/h4&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="n"&gt;accountObjectId&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="mi"&gt;1181110&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;  
 &lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="n"&gt;contextContextIds&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="mi"&gt;1181110&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;10735169&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;10003&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;959150&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;955240&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt;
 &lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="n"&gt;contextLogin&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="n"&gt;fred&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
 &lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="n"&gt;contextRoles&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;2010000&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt;
 &lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="n"&gt;targetAccessRights&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sc"&gt;'i'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sc"&gt;'l'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sc"&gt;'v'&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt;
 &lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="n"&gt;targetEntityNamee&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="n"&gt;Project&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
 &lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="n"&gt;targetObjectId&lt;/span&gt;&lt;span class="err"&gt;'&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;29680&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Adam Tauno Williams</dc:creator><pubDate>Thu, 31 Oct 2013 13:34:19 -0000</pubDate><guid>https://sourceforge.net39347d4bb0728ddce08259b755b2a3f711a56609</guid></item></channel></rss>