Skip to main content

Permission Configuration Guide

CloudBase provides a multi-level data permission management mechanism, ensuring data security while meeting the permission control requirements of different business scenarios.

📄 Page Permissions

Enter the app, click the "App Settings" button in the upper right corner to access the App Settings page.

When Application Access Rules selects Use Independent Hosted Login Page, page permissions can be configured.

The role permissions configured here need to be set in conjunction with role management. The User => Role => Role Permissions relationship is as follows:

You can access the Role Management page from the Cloud Admin Console.

System roles are categorized as:

Role NicknameDescription
Default Visitor RoleThe "Default Visitor Role" is assigned by the system to anonymous users by default, and members cannot be added manually.
Default Super Administrator RoleThe "Default Super Administrator Role" is a system-generated role with all permissions, and members can be added manually.
Default External User RoleThe "Default External External User Role" is assigned by the system to external registered users by default, and members cannot be added manually.
Default Internal User RoleThe "Default Internal User Role" is assigned by the system to internal organization members by default, and members cannot be added manually.

You can choose to create "Custom Roles" to implement more granular permission control.

🎯 Data Permissions

CloudBase data permission management includes three levels:

Permission TypeControl GranularityApplicable ScenariosConfiguration Complexity
Basic Permission ControlModel LevelSimple Permission RequirementsLow
Role PermissionsUser LevelOrganizational Structure PermissionsMedium
Security Rule PermissionsDocument LevelComplex Business LogicHigh

Permission Priority

Relationships between different permission types:

  • Role Permissions and Basic Permissions are combined as a union to form the final permissions.
  • Security Rule Permissions have the highest priority and override other permission settings.
  • Choose the appropriate permission management method based on business complexity.

🔧 Basic Access Control

Features

Basic Permission Control is the simplest permission management method, suitable for most common business scenarios:

  • Model-level Control: Apply uniform permissions to the entire data model.
  • Predefined Permission Templates: Provide common permission configuration templates.
  • Simple and Easy to Use: No need to write complex rule expressions.

Configuration Method

On the Data Model page in the CloudBase console, set corresponding permissions for each model:

Basic Permission Configuration

Permission Options

Based on the user's identity, select the corresponding permissions.

  • All users include anonymous users, external users, and internal users.
  • The actual permissions for an anonymous user are the maximum set of permissions from both "all users" and "anonymous users"; the same principle applies to external users and internal users.
  • Best Practice 1: Manage permissions exclusively through "all users"; set permissions for anonymous users, external users, and internal users to no access.
  • Best Practice 2: Delete the "all users" rules and manage permissions through granular roles.
Permission TypeApplicable Scenarios
Read all data and modify own dataPublic content, such as articles and products
Read and modify own dataPrivate data, such as user profiles
Read all data but cannot modify dataConfiguration data, such as system settings
No accessSensitive data, such as financial information

👥 Custom Role Permission Control

Feature Overview

Role-based permissions are a permission management approach based on organizational structure, suitable for hierarchical permission control in enterprise-level applications. It complements Basic Permission Control, with the final permissions being the union of both.

Core Features:

  • Support for Organizational Structure: Permission control based on departments and reporting relationships.
  • Role Inheritance: Supports hierarchical inheritance of permissions.
  • Flexible Combination: Combined with Basic Permissions as a union to provide more flexible permission configuration.

Configuration Steps

Step 1: Access Role Management

Access the Custom Roles Page to manage organizational structure and role definitions:

Role Management Entry

Step 2: Configure Row-level Permissions

Select the target role and click "Row Permission Settings" for detailed configuration:

Row Permission Settings

Permission Level Description

Permission LevelData ScopeApplicable ScenariosExample
View ownData where the Owner field is set to selfPersonal data managementEmployees can only view their own attendance records
View Self and SubordinatesData of self and subordinatesTeam managementSupervisors can view work reports of team members
View Own Department and Sub-departmentsData of own department and sub-departmentsDepartment managementDepartment managers view all projects within the department
View AllAll dataSystem managementAdministrators can view company-wide data

Permission Combination Rules

Relationship Between Read and Write Permissions

⚠️ Important: Row modification permission automatically includes read permission, meaning that having modification permission implies having read permission.

Permissions Union Calculation

Basic Permissions + Role Permissions = Final Permissions

Example Scenario:

Basic Permissions: Readable and writable only by the creator and administrators
Role Permissions: View All + No Modification Permission
─────────────────────────────────
Final Permissions: Can view all data, but can only modify the data they created

🛡️ Security Rule Permissions

If the above two permission modes do not meet your requirements, you can use Security Rule Permissions for more granular permission control.

Please refer to the Custom Role Permission Control document.

Practical Application Cases

Case 1: Blog Permissions

Business Requirements:

  • Can view everyone's blogs
  • Can update their own blogs

Basic Permission Configuration

All users/Read all data, Modify own data

Case 2: Project Management System

Business Requirements:

  • Project members can only view projects they participate in.
  • Project managers can manage the projects under their responsibility.
  • Department managers can view all projects within the department.

Basic Permission Configuration

All users/Read and modify own data

Role Permissions Configuration

RoleRole Data PermissionsRow Modification PermissionsFinal Effect
SalespersonView ownSelfCan only view and modify their own customers
Sales SupervisorView Self and SubordinatesSelf and subordinatesCan manage all customers of the team
Sales DirectorView AllView AllCan manage all customers

🎯 Permission Selection Guide

Select based on business complexity

Business ScenarioRecommended SolutionReason
Simple ApplicationBasic Permission ControlSimple configuration that meets basic requirements
Complex Business LogicSecurity Rule PermissionsFlexible expressions that support complex judgments
Enterprise-level ApplicationRole Permissions + Basic PermissionsSupports organizational structure with clear permission hierarchy
High Security RequirementsSecurity Rules + Role PermissionsMulti-layered protection with fine-grained control

Permission Configuration Recommendations

  1. Start simple: Begin with basic permissions and gradually upgrade as needed
  2. Layered Design: Basic permissions handle common logic, while security rules handle specific logic
  3. Test Verification: Thoroughly test various permission scenarios in the development environment
  4. Documentation: Thoroughly document the permission design rationale and configuration instructions

Through reasonable permission configuration, you can build a secure yet flexible data access control system that meets various complex business requirements.