Open mb-wali opened 3 years ago
Questions:
restricted
.known resources:
rdm-permission_policy uses something called generators.
tests for permission_policy
invenio-rdm-records generators
invenio-records-permissions Generators
invenio-access : Role-based access control with object level permissions.
Account Actions The accounts fetching external records (e.g. 'pure_account') should only be allowed to create new records and edit their own unpublished records.
Other accounts with the associated role should be able to edit and publish these records (e.g. an account with role 'curator_pure' can edit and publish all records created by 'pure_account').
Role Management
Following commands can be used for role management.
To create a new role: invenio roles create curator_pure
To add a role to a user: invenio roles add user1@tugraz.at curator_pure
To remove a role from a user: invenio roles remove user1@tugraz.at curator_pure
Permission Policy
As invenio-records-marc21
will have its own permission policy (and not inherit from RDMRecordPermissionPolicy), it is necessary to define the policy in this module as well. The generators for the curators can be imported from invenio-config-tugraz
. This will make sure, that no module relies on invenio-rdm-records
Intro:
invenio-records-marc21 is planned to provide a data model for different systems such as
PURE
,ALMA
,DIGLIB
andCMS
Campus online, and there are modules for each of the above-mentioned systems in order to fetch & push data via cronjobs of celery.owned_by
field to add his id. e.g.keep in mind that the ids and emails are not a valid value, just an example.
Defining multiple roles:
consider defining a role for each of the systems in our repository data.