Skip to content

Commit ff92a30

Browse files
committed
Added details about Delegated Access.
Need more details including images.
1 parent 97652f1 commit ff92a30

File tree

2 files changed

+16
-6
lines changed

2 files changed

+16
-6
lines changed

modules/integration-points/reports/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,5 +79,5 @@ Here is what users may see in the event they do not have the appropriate access.
7979

8080
![Reports with Access](../../../.gitbook/assets/reports-menuwithaccess.png)
8181

82-
**Note:** The role `sitecore\Sitecore Client Maintaining` is granted access to the reports by default.
82+
**Note:** In verson 6.4 the default access changed from `sitecore\Sitecore Client Maintaining` to a lower privileged account `sitecore\Sitecore Client Authoring`.
8383

security/README.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The following settings are configured under `core:\content\Applications\PowerShe
4040
| PowerShell ISE | sitecore\Developer \(read\) |
4141
| PowerShell ListView | sitecore\Sitecore Client Users \(read\) |
4242
| PowerShell Runner | sitecore\Sitecore Client Users \(read\) |
43-
| PowerShell Reports | No default settings. See [here](../modules/integration-points/reports/) for instructions. |
43+
| PowerShell Reports | sitecore\Sitecore Client Authoring. See [here](../modules/integration-points/reports/) for instructions. |
4444

4545
**Note:** The security is validated in each SPE application within the function `OnLoad`.
4646

@@ -116,7 +116,7 @@ Actions supported out of the box:
116116
</sitecore>
117117
```
118118

119-
Gates with **Password** protection enabled prompt the user when no elevated session is available.
119+
Gates with **Password** protection enabled prompt the user when no elevated session is available. When using Azure AD and or similar provider you should use the **Confirm** action.
120120

121121
![Elevate Session State](../.gitbook/assets/security-elevatedsessionstate-password.png)
122122

@@ -196,7 +196,7 @@ Look for the following section and enable as needed.
196196
* **Media Download** - Used when the url contains all the information needed to download a media item from the server. Enable when using the **SPE Remoting** module. Service associated with `RemoteScriptCall.ashx`.
197197
* **Media Upload** - Used when the url contains all the information needed to upload a media item to the server. Enable when using the **SPE Remoting** module. Service associated with `RemoteScriptCall.ashx`.
198198
* **Handle Download** - Used when a file is downloaded through the Sitecore interface. Enable when using the **SPE Remoting** module. Service associated with `RemoteScriptCall.ashx`.
199-
* Required for the following features: [Out-Download](../appendix/common/out-download.md) command.
199+
* Required for the following features: [Out-Download](../appendix/common/out-download.md) command. If the report export buttons do not work it could be because of this setting.
200200
* **Client** - Used for the SPE Console. Service associated with `PowerShellWebService.asmx`.
201201
* Required for the following features: PowerShell [Console](../interfaces/console.md), PowerShell [ISE](../interfaces/scripting.md),
202202
* **Execution** - Used when SPE checks if the user has access to run the application.
@@ -290,7 +290,17 @@ You are required to explicitly grant the SPE Remoting session user account to a
290290
</configuration>
291291
```
292292

293-
#### IIS level security
293+
### Delegated Access
294+
295+
There may be scenarios in which you need to grant users access to run scripts which perform operations elevated higher than the current access. The various integration points made visible in the Content Editor (Context Menu, Ribbon, Reports) can be configured to run the scripts impersonating a power user. This has the advantage of giving lower privileged users "special" access without having to make members of more privileged roles. In [#1283](https://github.com/SitecorePowerShell/Console/issues/1283) this feature introduced a simple configuration item to apply the "special" access.
296+
297+
**Step 1:** Create a new delegated access item using the provided insert option.
298+
**Step 2:** Enter the role in which lower privileged users are members.
299+
**Step 3:** Enter the user account with elevated access. This could be `sitecore\Admin` or any other user your environment has configured. This user will be impersonated during script execution.
300+
**Step 4:** Select each script/library that should be delegated. Script/library items with a rule checking for delegated access should be included as well as scripts that should be run with the impersonated account.
301+
**Step 5:** Enable the delegated access item when ready for use.
302+
303+
### IIS level security
294304

295305
Deny access to the web services for unauthenticated users and roles using the `<deny>` element as described [here](https://msdn.microsoft.com/en-us/library/8aeskccd%28v=vs.71%29.aspx) in `sitecore modules\PowerShell\Services\web.config`.
296306

@@ -340,7 +350,7 @@ You will also need to patch the configuration with the following:
340350
</configuration>
341351
```
342352

343-
For your convenience we've included a package bundled with all of the above called _SPE Minimal-4.x for Sitecore x.zip_. Any of the disabled configuration files should be enabled following extraction.
353+
For your convenience we've included a package bundled with all of the above called _SPE.Minimal-6.x.zip_. Any of the disabled configuration files should be enabled following extraction.
344354

345355
### References
346356

0 commit comments

Comments
 (0)