Skip to main content

auth-manager

Auth Manager

Auth Manager is cidaas's enterprise authorization platform that bundles multiple groups and roles into reusable templates representing job functions or positions. Instead of manually assigning individual permissions, templates define complete access profiles that grant users all necessary groups and roles across multiple applications, systems, and locations in a single request.

Core Concept: Function-Based Access

Auth Manager templates represent enterprise functions (e.g., "Presales Person", "Project Manager", "Regional Sales Lead"). Each template bundles:

  • Multiple groups across different applications
  • Multiple roles within those groups
  • Cross-system access (CRM, ERP, collaboration tools, etc.)
  • Location-based permissions (office access, regional systems, etc.)

Example: A "Presales Person" template might grant:

  • Group: sales-team with role presales in CRM application
  • Group: product-access with role viewer in product catalog
  • Group: regional-west with role member for location-based access
  • Group: demo-environment with role tester for demo systems

All assigned with one template and one approval.


Benefits

Efficiency Gains

  • Self-Service: Users request complete access profiles without IT tickets
  • Automated Workflows: All permissions assigned automatically upon approval
  • Time Savings: Reduce manual permission management by 80%+
  • Faster Onboarding: New employees get complete access in hours, not days

Security & Compliance

  • Time-Bound Access: Permissions automatically expire when no longer needed
  • Approval Workflows: Multi-level approvals for sensitive access profiles
  • Audit Trail: Complete history of who requested, approved, and received access
  • Least Privilege: Grant access only for required duration

Better Governance

  • Centralized Management: All permissions managed through function templates
  • Consistent Policies: Standardized approval processes across organization
  • Visibility: Track all authorization requests and their status
  • Compliance Ready: Automated access reviews for regulatory requirements

Terminology

Key Terms

TermDefinition
UATUser Authorization Template - A reusable blueprint bundling multiple groups/roles into an enterprise function
UARUser Authorization Request - A specific request for access using a UAT
RequestorUser who creates an authorization request (can be for themselves or others)
ApproverUser who can approve or reject authorization requests
Designated UserTarget user who will receive the permissions if request is approved
Template StatusCurrent state: inProgress, active, inActive, archived
Request StatusCurrent state: pending, granted, assigned, rejected, completed
Approval SequenceOrder: SEQUENTIAL_ALL, PARALLEL_ALL, and PARALLEL_ONE
Valid FromStart date/time when permissions become active
Valid UntilEnd date/time when permissions expire (empty = permanent)

Request Status Flow

StatusDescriptionWhat Happens Next
pendingRequest submitted, awaiting approvalApprovers can review and approve/reject
grantedRequest approved, permissions not yet assignedSystem automatically assigns when validFrom date arrives
assignedPermissions are activeUser has access; expires when validUntil date arrives
rejectedRequest deniedNo permissions granted
completedAccess period expiredPermissions automatically revoked

Approval Sequences

Sequence TypeDescriptionUse Case
SEQUENTIAL_ALLAll approvers must approve in orderHigh-security scenarios requiring multiple approvals
PARALLEL_ALLAll approvers must approve (any order)Multiple stakeholders need to agree
PARALLEL_ONEAny single approver can approveFast approval for low-risk permissions

Good To Know

Template Visibility

  • Active templates only: Non-admin users can only see and use active templates
  • Admin access: Users with AUTHTEMPLATE_ADMIN_GROUPMAP role can see all template statuses
  • Template filtering: Users only see templates they're allowed to use (based on requestor rules)

Permission Assignment

  • Automatic assignment: Permissions assigned when request is granted and validFrom date has arrived
  • Automatic revocation: Permissions removed when validUntil date arrives or request is rejected/completed
  • Future-dated: Set validFrom in the future to schedule access activation

Best Practices

  • Clear naming: Use descriptive template names (e.g., "Presales Person - West Region")
  • Bundle related access: Group all permissions needed for a function together
  • Time limits: Set validUntil for temporary access
  • Test first: Create template in inProgress status, test, then activate

Technical APIs

API Overview

Base URL: {{your-domain}}/userauthmanager

Authentication

  • User Token: cidaas:userauth_mgmt + group role AUTHTEMPLATE_ADMIN_GROUPMAP
  • Client Credentials: cidaas:userauth_template_write

Request Example

How to create user authorization template?

The User authorization template comprises groups, roles, approvers, requesters, and the types of approvals. You can use this template multiple times to request access for others or yourself.

Step 1: Access Template Creation

  1. Log in to the Auth Manager Dashboard
  2. Navigate to the Approve authorization requests tab
  3. Click on the Create authorization template icon

Step 2: Configure Basic Information

  1. Template Name: Enter a descriptive name for your template (e.g., "Admin Access Request")

  2. Description: Provide a clear description of what this template is for

  3. Template Type: Select the appropriate type (typically "usergroupmap" for group/role assignments)

    auth-manager-new-template

Step 3: Set Approval Sequence

Choose how approvals should be processed:

  • Sequential: Approvals must be granted in the exact order specified in the approvers list. Each approver must approve before the next one can act.
  • Parallel All: All approvers must approve, but they can do so in any order. Access is granted only when everyone has approved.
  • Parallel One: Any single approver can approve the request. Access is granted as soon as one approver approves.

Step 4: Define Groups and Roles

  1. Click Add Group/Role to specify what permissions this template grants
  2. For each entry, specify:
    • Client Name: The application or system this applies to
    • Group ID: The specific group to assign users to
    • Roles: The roles to assign within that group
  3. You can add multiple group/role combinations for complex permission sets

Step 5: Set Validity Period

  1. Valid From: Set the start date when this template becomes active
  2. Valid To: Set the end date when this template expires
    • Leave empty for permanent templates
    • Set specific dates for time-limited access

Step 6: Configure Allowed Requesters

Define who can use this template to request access:

  1. Self Requests: Enable if users can request access for themselves
  2. Specific Users: Add individual user IDs who can make requests
  3. Group Filters: Specify groups whose members can make requests
    • Set group type (e.g., "MANAGER_GROUP")
    • Define role filters within those groups
    • Choose match condition (AND/OR)

Step 7: Define Approvers

Specify who can approve requests made with this template:

  1. Actor Subs: Add specific user IDs who can approve
  2. Group Filters: Define groups whose members can approve
    • Set group type (e.g., "ADMIN_GROUP")
    • Define role filters (e.g., "GROUP_ADMIN")
    • Choose match condition (AND/OR)

Step 8: Configure Designated Users (Optional)

If applicable, specify which users this template can be applied to:

  1. Group Filters: Define target groups for the template
  2. Role Filters: Specify roles within those groups
  3. Match Conditions: Set how multiple criteria should be evaluated

Step 9: Create and Test the Template

  1. Review all configuration settings
  2. Click Create to save the template
  3. Test the template by making a sample request
  4. Verify that the approval workflow functions as expected

Step 10: Manage Existing Templates

  1. Click on the View user authorization template (UAT) icon in the Approve authorization requests tab
  2. View, edit, or delete existing templates as needed
  3. Monitor template usage and effectiveness

API Reference

For developers integrating with the Auth Manager Dashboard, see the User Authorization Management API for complete API documentation and endpoints.

How to request new authorization?

Step 1: Access Authorization Request

  1. Log in to the Auth Manager Dashboard
  2. Navigate to the My authorization requests tab
  3. Click on the New authorization request icon

Step 2: Select Authorization Template

  1. From the dropdown list, select the appropriate authorization template
  2. Review the template details to understand what permissions you're requesting
  3. Ensure you have the right to use this template (check allowed requesters)

Step 3: Specify Request Details

  1. Request Type: Choose whether you're requesting for:
    • Yourself: Request access for your own account
    • Others: Request access for another user or multiple users
  2. Target User(s): If requesting for others, specify:
    • User email addresses
    • User IDs
    • Or select from a user list (if available)
  3. Reason: Provide a clear business justification for the access request
    • Explain why this access is needed
    • Include any relevant context or urgency

Step 4: Set Access Duration

  1. Access Duration: Specify how long the requested access should last:
    • Permanent: Access remains until manually revoked
    • Time-limited: Set specific start and end dates
    • Duration-based: Set access for a specific number of days/weeks/months
  2. Start Date: When should the access begin (if applicable)
  3. End Date: When should the access expire (if time-limited)

Step 5: Review and Submit

  1. Review all request details for accuracy
  2. Verify that the template, users, and duration are correct
  3. Check that your reason is clear and justified
  4. Click Send to submit the authorization request

auth-manager-new-authorization-request

Step 6: Monitor Request Status

  1. After submission, you'll receive a confirmation
  2. Monitor the request status in the My authorization requests tab
  3. Check for notifications about approval progress
  4. Respond to any questions from approvers if needed

Status in Auth manager

Approved ✅ : This status states that the request is approved, but the groups and roles are yet to be assigned.

Assigned 🙋‍♂️✅:This status states that the request is approved and groups and roles are assigned.

Rejected ❌ : This status states that the request is rejected.

Scale your Auth Manager for different layouts

The URL pattern follows a consistent structure to ensure easy navigation and maintenance.

URL Pattern:

### Key Endpoints

| API | Description | Link |
|----------|--------|-------------|
|Create User Authorization Template| Creates a new User Authorization Template (UAT) for managing user group assignments and authorization workflows. | [View API](../../reference/ouauthtemplates-mgmt.yaml/paths/~1userauth-srv~1uauthtemplates/post) |
| Get User Authorization Template by ID | Retrieves a specific User Authorization Template by its ID. | [View API](../../reference/ouauthtemplates-mgmt.yaml/paths/~1userauth-srv~1uauthtemplates~1{id}/get) |
| Update User Authorization Template | Updates an existing User Authorization Template. | [View API](../../reference/ouauthtemplates-mgmt.yaml/paths/~1userauth-srv~1uauthtemplates~1{id}/put) |
| List User Authorization Templates | Searches and filters User Authorization Templates with pagination support | [View API](../../reference/ouauthtemplates-mgmt.yaml/paths/~1userauth-srv~1graph~1uauthtemplates/post) |
| Create User Authorization Request | Creates a new authorization request using a User Authorization Template. | [View API](../../reference/ouauthtemplates-mgmt.yaml/paths/~1userauth-srv~1uauthrequests/post) |
| List User Authorization Requests | Retrieves authorization requests for the authenticated user. | [View API](../../reference/ouauthtemplates-mgmt.yaml/paths/~1userauth-srv~1graph~1uauthrequests/post) |
| Approve or Reject Authorization Request | Approves or rejects an authorization request. Only approvers defined in the template can approve requests. | [View API](../../reference/ouauthtemplates-mgmt.yaml/paths/~1userauth-srv~1uauthrequests~1{id}~1approvals/post) |
| Change Authorization Request Validity Period | Updates the validity period (validUntil) of an authorization request. | [View API](../../reference/ouauthtemplates-mgmt.yaml/paths/~1userauth-srv~1uauthrequests~1{id}~1validitychanges/post)|


---

## Troubleshooting

### Template Not Visible
- Check template status (must be `active` for non-admin users)
- Verify user is in `allowedRequestors` (actorSubs or groupFilters)
- Admin users can see all templates regardless of status

### Request Stuck at "Pending"
- Verify approvers exist and match template rules
- Check approvers are in correct groups with required roles
- For sequential approval, ensure previous approvers have approved

### Permissions Not Assigned
- Check `validFrom` date - must be current or past date
- Wait for system task to process (runs periodically)
- Verify request status is `granted`

### Cannot Create Request
- Verify user matches `allowedRequestors` rules
- Check template status is `active`
- If requesting for self, ensure `self: true` in template

---

## Use Cases

For detailed real-world scenarios showing how to bundle multiple groups and roles into enterprise functions, see: [Use Cases](./auth-manager/use-cases.md)

---

## Quick Start

### Prerequisites
- cidaas tenant with enabled authManager Add-On
- Admin access to create apps and manage users
- Required scopes: `cidaas:userauth_mgmt`, `groups`, `email`, `profile`, `openid`

### Setup
1. Create Application (Web Application type)
2. Configure scopes: `cidaas:userauth_mgmt`, `groups`, `email`, `profile`, `openid`
3. Create a custom restriction [group](/guides/user-management/setup/user-groups) to define which users can access this portal.
3. Assign admin role: Add `AUTHTEMPLATE_ADMIN_GROUPMAP` to authorized users
4. Access dashboard: `https://{{your-domain}}/auth-manager/{{clientName}}`

---

<!-- theme: warning -->
> ### Help and support
>
> Please contact us directly on our [support page](https://support.cidaas.com/en/support/home).