User guide

Chapter 1: Overview
1-38
Examples of Roles
Table 1-5 Role
Post/department Role name
General employee employee
Executive officer executives
Accounting department finance department
Administration department administration department
Example of Role Set
Table 1-6 Role Set
Post/department Role set name Contained role
All employees all
employeeexecutives
User Information
For details of user information, refer to "User information".
Protection Resource
If authentication and authorization are required for users to access resources such as HTML documents
and CGI applications disclosed in the business system, define those resources as protection resources.
Protection resource information consists of site and path configurations.
Site Configuration
The site configuration defines the site name of the business system. The format of site name is "fully
qualified domain name (FQDN) + port number." FQDN is the host name that includes domain name.
When the Business system public URL is "https://www.fujitsu.com:443/index.html", the site name is
"www.fujitsu.com:443".
Path Configuration
The path configuration specifies the name of the directory or file that is disclosed on the site defined by
the site configuration and requires authentication and authorization for access. When a directory name
is specified (when the path name ends with "/"), all resources under the specified directory are the
targets of authentication and authorization.
In addition, the names of the roles and role sets that are permitted to access the specified directories or
files are specified. Multiple roles and role sets can be specified.
The specification of path configurations used for authentication and authorization is described below:
When a directory or folder that is not defined by path configuration is accessed, the relevant
resource is disclosed unconditionally.
When only a directory or folder is specified and roles or role sets are not defined for the resource,
the resource is disclosed to only authenticated users.
When a directory or folder is specified and roles or role sets are defined for the resource, the
resource is disclosed to only the users who are authenticated and permitted to access the resource.