Default permissions
These are default permissions in Magnolia. You can manage them in the Security app. The default permissions are just an example how to grant permissions in a typical website. You should adapt the permissions to match your own organization. App permissions are configured in the app launcher configuration.
Roles
anonymous
role - author instance
The anonymous
role defines the permissions of public, unauthenticated users.
Permissions are different on the author and public instances.
Workspace | Permission | Scope | Path |
---|---|---|---|
Category |
Read only |
Selected and sub nodes |
|
DAM |
Read only |
Sub nodes |
|
GoogleSitemaps |
Read only |
Selected and sub nodes |
|
Marketing-tags |
Read only |
Selected and sub nodes |
|
Resources |
Read only |
Sub nodes |
|
Website |
Deny access |
Sub nodes |
|
Permission | Path |
---|---|
Deny |
|
Deny |
|
anonymous
role - public instance
Workspace | Permission | Scope | Path |
---|---|---|---|
Category |
Read only |
Selected and sub nodes |
|
Dam |
Read only |
Selected and sub nodes |
|
GoogleSitemaps |
Read only |
Selected and sub nodes |
|
Marketing-tags |
Read only |
Selected and sub nodes |
|
Resources |
Read only |
Sub nodes |
|
Website |
Read only |
Sub nodes |
|
Permission | Path |
---|---|
Get & Post |
|
Deny |
|
Deny |
|
Deny |
|
Deny |
|
Deny |
|
Deny |
|
superuser
role
The superuser
role provides full access to the system.
The permissions are the same on both author and public instances.
Workspace | Permission | Scope | Path |
---|---|---|---|
AdvancedCache |
Read/Write |
Sub nodes |
|
Category |
Read/Write |
Sub nodes |
|
Config |
Read/Write |
Sub nodes |
|
Contacts |
Read/Write |
Sub nodes |
|
Dam |
Read/Write |
Sub nodes |
|
Dms* |
Read/Write |
Sub nodes |
|
Forum |
Read/Write |
Sub nodes |
|
GoogleSitemaps |
Read/Write |
Sub nodes |
|
Imaging |
Read/Write |
Sub nodes |
|
Keystore |
Read/Write |
Sub nodes |
|
Marketing-tags |
Read/Write |
Sub nodes |
|
Messages |
Read/Write |
Sub nodes |
|
Personas |
Read/Write |
Sub nodes |
|
Profiles |
Read/Write |
Sub nodes |
|
Resources |
Read/Write |
Sub nodes |
|
Rss |
Read/Write |
Sub nodes |
|
Scripts |
Read/Write |
Sub nodes |
|
Segments |
Read/Write |
Sub nodes |
|
Stories |
Read/Write |
Sub nodes |
|
Tags |
Read/Write |
Sub nodes |
|
Tasks |
Read/Write |
Sub nodes |
|
Templates |
Read/Write |
Sub nodes |
|
Tours |
Read/Write |
Sub nodes |
|
Usergroups |
Read/Write |
Sub nodes |
|
Userroles |
Read/Write |
Sub nodes |
|
Users |
Read/Write |
Sub nodes |
|
Website |
Read/Write |
Sub nodes |
|
Workflow (DX Core) |
Read/Write |
Sub nodes |
|
Permission | Path |
---|---|
Get & Post |
|
Applies to | Name | Path |
---|---|---|
App |
Publishing |
|
Configuration |
|
|
Security |
|
|
Security |
|
|
Mail tools |
|
|
Dev tools |
|
|
Backup |
|
|
App launcher |
Dev group |
|
Tools group |
|
|
Tasks app |
Abort action |
|
Archive action |
|
travel-demo-base
role
The travel-demo-base
role is specific to the demo website.
The permissions are the same on both author and public instances.
Workspace | Permission | Scope | Path |
---|---|---|---|
Category |
Read only |
Selected and sub nodes |
|
Dam |
Read only |
Sub nodes |
|
Tours |
Read only |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
travel-demo-admincentral
role
The travel-demo-admincentral
role is specific to the demo-project example websites.
The permissions are the same on both author and public instances.
Permission | Path |
---|---|
Get & Post |
|
travel-demo-editor
role
Workspace | Permission | Scope | Path |
---|---|---|---|
Category |
Read/Write |
Sub nodes |
|
Dam |
Read/Write |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
Website |
Read/Write |
Sub nodes |
|
Applies to | App | Name | Path |
---|---|---|---|
App |
Assets |
|
|
Action |
Assets |
Publish |
|
Action |
Pages |
Publish |
|
travel-demo-publisher
role
Workspace | Permission | Scope | Path |
---|---|---|---|
Userroles |
Read only |
Selected |
|
Website |
Read/Write |
Sub nodes |
|
Applies to | App | Name | Path |
---|---|---|---|
App |
Assets |
|
|
Action |
Assets |
Publish |
|
Action |
Pages |
Publish |
|
travel-demo-tour-editor
role
Workspace | Permission | Scope | Path |
---|---|---|---|
Category |
Read only |
Selected and sub nodes |
|
Dam |
Read only |
Sub nodes |
|
Tours |
Read only |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
editor
role
Installed by the workflow
module (DX Core). Allows editing of content.
Workspace | Permission | Scope | Path |
---|---|---|---|
Category |
Read/Write |
Sub nodes |
|
Contacts |
Read/Write |
Sub nodes |
|
Dam |
Read/Write |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
Website |
Read/Write |
Sub nodes |
|
Applies to | App | Name | Path |
---|---|---|---|
Action |
Pages |
Activate |
|
publisher
role
Installed by the workflow
module (DX Core). Allows publishing of content.
Workspace | Permission | Scope | Path |
---|---|---|---|
Category |
Read only |
Sub nodes |
|
Contacts |
Read only |
Sub nodes |
|
Dam |
Read only |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
Website |
Read only |
Sub nodes |
|
Workflow |
Read/Write |
Sub nodes |
|
Applies to | App | Name | Path |
---|---|---|---|
Action |
Pages |
Publish |
|
workflow-base
role
Base role allowing users to use the workflow
workspace (DX Core).
Workspace | Permission | Scope | Path |
---|---|---|---|
Workflow |
Read/Write |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
contact-base
role
Workspace | Permission | Scope | Path |
---|---|---|---|
Contact |
Read only |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
rest-admin
role
The superuser account has the rest-admin role by default so you can use superuser to test your requests.
However, for production use, you should create a custom REST role.
The anonymous role is specifically denied access to the REST endpoints.
|
Permission | Path |
---|---|
Get & Post |
|
Applies to | Name | Path |
---|---|---|
Commands |
Delete |
|
Publish |
|
rest-editor
role
Permission | Path |
---|---|
Deny |
|
Get |
|
Deny |
|
Deny |
|
Get & Post |
|
Deny |
|
Get & Post |
|
Get & Post |
|
rest-anonymous
role
If you’re a PaaS customer, there are some differences with the rest-anonymous role.
This is highlighted below in a PaaS-specific section in the table.
|
Permission | Path |
---|---|
Deny |
|
Get |
|
PaaS only |
|
Get & Post |
|
Get & Post |
|
Get |
|
rest-backup
role
Permission | Path |
---|---|
Get & Post |
|
Applies to | Name | Path |
---|---|---|
Command |
Backup |
|
rss-aggregator-base
role
Workspace | Permission | Scope | Path |
---|---|---|---|
Rss |
Read-only |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
scripter
role
Workspace | Permission | Scope | Path |
---|---|---|---|
Scripts |
Read/Write |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
Permission | Path |
---|---|
Get & Post |
|
Applies to | App | Path |
---|---|---|
App |
Groovy |
|
templater-base
role
Workspace | Permission | Scope | Path |
---|---|---|---|
Config |
Read-only |
Selected and sub nodes |
|
Templates |
Read/Write |
Sub nodes |
|
Userroles |
Read only |
Selected |
|
Applies to | App | Path |
---|---|---|
App |
Templates |
|
Groups
Group permissions are the same on both author and public instances.
travel-demo-pur
group
The travel-demo-pur
group is used to organize the editors of the sample websites.
Assigned groups | Assigned roles |
---|---|
(none) |
|
|
|
|
|
|
|
|
|
|
travel-demo-editors
group
The travel-demo-editors
group is used to organize the editors of the sample websites.
Assigned groups | Assigned roles |
---|---|
(none) |
|
|
|
|
|
|
|
|
|
|
|
|
Users
eric
user
The user eric
is an example editor.
Assigned groups | Assigned roles |
---|---|
|
(none) |
eric-de
user
The user eric-de
is an example German editor.
Assigned groups | Assigned roles |
---|---|
|
(none) |
System users
anonymous
system user
The system user anonymous
represents a Web visitor.
The anonymous role has different permissions on the author and public instances.
|
Assigned groups | Assigned roles |
---|---|
(none) |
|
|
|
|
|
|
|
|
|
|
|
|