Application memberships
The application memebership object and the allowed CRUD operations on the related resource endpoint
Last updated
The application memebership object and the allowed CRUD operations on the related resource endpoint
Last updated
Application memberships connect the of a user of an to a specific , via the related with determined permissions granted by the associated .
Please note that only Admins (i.e. users with an admin
role) can perform all the CRUD actions on the application memberships of an organization, while Members (i.e. users with a read_only
or custom
role) are allowed only to a specific application membership and/or to of application memberships.
Since each Dashboard app comes with its own set of in terms of CRUD actions on the single Core API resources, to get the real permissions of the user on the specific app the permissions associated with the role used to create an application membership must be crossed with the app's ones. For example:
admin
roles will get the Full access permissions of the related app
read_only
roles will get the Read-only permissions of the related app
custom
roles will get their custom permissions as long as they are a subset of the Full access list of permissions of the related app
You can add some restrictions to the default rules above and narrow the scope of an application membership and granting specific users Partial access to specific apps (e.g. allowing a user to manage only the shipments identified by an ID included in a specific array, allowing a user to update only the orders belonging to a specific market, etc.) by leveraging the filters
attribute:
To compose the filter predicate you just need to follow the you use when filtering a collection of Core API resources — {{attributes}}_{{matcher}}
. You must specify filtering rules as a valid JSON object. List values for the *_in
matcher need to be expressed as arrays.