You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/energy-data-services/how-to-manage-users.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,12 +20,12 @@ In this article, you learn how to manage users and their memberships in OSDU gro
20
20
- Generate the service principal access token that's needed to call the Entitlement APIs. See [How to generate auth token](how-to-generate-auth-token.md).
21
21
- Keep all the parameter values handy. They're needed to run different user management requests via the Entitlements API.
22
22
23
-
## Fetch OID
23
+
## Fetch object-id
24
24
25
-
The object ID (OID) is the Microsoft Entra user OID.
25
+
The Azure object ID (OID) is the Microsoft Entra user OID.
26
26
27
27
1. Find the OID of the users first. If you're managing an application's access, you must find and use the application ID (or client ID) instead of the OID.
28
-
1. Input the OID of the users (or the application or client ID if managing access for an application) as parameters in the calls to the Entitlements API of your Azure Data Manager for Energy instance.
28
+
1. Input the OID of the users (or the application or client ID if managing access for an application) as parameters in the calls to the Entitlements API of your Azure Data Manager for Energy instance. You can not use user's email id in the parameter and must use object ID.
29
29
30
30
:::image type="content" source="media/how-to-manage-users/azure-active-directory-object-id.png" alt-text="Screenshot that shows finding the object ID from Microsoft Entra ID.":::
31
31
@@ -39,11 +39,14 @@ The object ID (OID) is the Microsoft Entra user OID.
39
39
If you try to directly use your own access token for adding entitlements, it results in a 401 error. The `client-id` access token must be used to add the first set of users in the system. Those users (with admin access) can then manage more users with their own access token.
40
40
1. Use the `client-id` access token to do the following steps by using the commands outlined in the following sections:
41
41
1. Add the user to the `users@<data-partition-id>.<domain>` OSDU group.
42
-
2. Add the user to the `users.datalake.ops@<data-partition-id>.<domain>` OSDU group.
42
+
2. Add the user to the `users.datalake.ops@<data-partition-id>.<domain>` OSDU group to give access of all the service groups.
43
+
3. Add the user to the `users.data.root@<data-partition-id>.<domain>` OSDU group to give access of all the data groups.
43
44
1. The user becomes the admin of the data partition. The admin can then add or remove more users to the required entitlement groups:
44
45
1. Get the admin's auth token by using [Generate user access token](how-to-generate-auth-token.md#generate-the-user-auth-token) and by using the same `client-id` and `client-secret` values.
45
46
1. Get the OSDU group, such as `service.legal.editor@<data-partition-id>.<domain>`, to which you want to add more users by using the admin's access token.
46
47
1. Add more users to that OSDU group by using the admin's access token.
48
+
49
+
To know more about the OSDU bootstrap groups, check out [here](https://community.opengroup.org/osdu/platform/security-and-compliance/entitlements/-/blob/master/docs/bootstrap/bootstrap-groups-structure.md).
47
50
48
51
## Get the list of all available groups in a data partition
49
52
@@ -61,7 +64,7 @@ Run the following curl command in Azure Cloud Shell to get all the groups that a
61
64
1. The value to be sent for the parameter `email` is the OID of the user and not the user's email address.
62
65
63
66
```bash
64
-
curl --location --request POST 'https://<adme-url>/api/entitlements/v2/groups/<group-name>@<data-partition-id>.dataservices.energy/members' \
67
+
curl --location --request POST 'https://<adme-url>/api/entitlements/v2/groups/<group-name>@<data-partition-id>.<domain>/members' \
0 commit comments