-
Notifications
You must be signed in to change notification settings - Fork 158
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New IA - User Management #5897
base: master
Are you sure you want to change the base?
New IA - User Management #5897
Conversation
PR Reviewer Guide 🔍Here are some key observations to aid the review process:
For each of these endpoints, the payload consists of two string lists: one for user IDs, the other for user group IDs. {
"userIds": [
"string"
],
"userGroupIds": [
"string"
]
} Using Tyk Classic APIsWhen working with Tyk Classic APIs, you manage owners for an API by modifying the
Manage Tyk Dashboard Users in Multiple OrganizationsIf you have deployed multiple [Tyk Organizations]({{< ref "basic-config-and-security/security/dashboard/organisations" >}}), you may have users that need access to more than one Organization (known as a "multi-org user"). This functionality requires a specific Tyk license. To support multi-org users, you must first enable the feature in your Dashboard configuration by setting either of the following to
You then must create users in both Organizations with identical credentials. During the login flow the user will see an additional page asking them to pick which available Organization they wish to log into. Once logged in, the user will have an additional drop-down in the top right navigation menu allowing them to switch between Organizations quickly. {{< note success >}} A user that does not belong to an Organization is sometimes referred to as an unbounded user. These users have visibility across all Organizations, but should be granted read-only access. Single Sign-On integrationYou can integrate your existing identity management server with the Tyk Dashboard, as explained in our detailed [Single Sign-On (SSO) guide]({{< ref "advanced-configuration/integrate/sso" >}}). This functionality is available with all Tyk licenses except Tyk Classic Cloud. By default all users who login via SSO are granted admin permissions. You can change this behavior by setting either default permissions for [users]({{< ref "basic-config-and-security/security/dashboard/create-users" >}}) or by creating a default [user group]({{< ref "basic-config-and-security/security/dashboard/create-user-groups" >}}) to which all new users are assigned. With some IDPs you can automatically assign different SSO users to different user groups by dynamically mapping the IDP's user groups, for example with [Azure AD]({{< ref "tyk-stack/tyk-manager/sso/dashboard-login-azure-sso#user-group-mapping" >}}). If you want to maintain an individual set of permissions for your SSO users, you must first enable SSO user lookup in your Dashboard configuration by setting either of the following to
You must then create a user in the Dashboard with the required permissions and matching email address. During the SSO login flow, if a user with the same email address is found in the existing organization, their permissions are applied.
|
PR Code Suggestions ✨Explore these optional code suggestions:
|
✅ PS. Pls add /docs/nightly to the end of url
To edit notification comments on pull requests, go to your Netlify site configuration. |
User description
For internal users - Please add a Jira DX PR ticket to the subject!
Preview Link
https://deploy-preview-5897--tyk-docs.netlify.app/docs/nightly/api-management/user-management/
Description
Screenshots (if appropriate)
Checklist
master
.PR Type
Documentation
Description
Introduced a comprehensive "User Management" guide for Tyk Dashboard.
Consolidated and updated multiple user-related documentation pages.
Added new menu entries and aliases for improved navigation.
Enhanced configuration with new parameters for link handling.
Changes walkthrough 📝
3 files
Added configuration for reference link error handling.
Updated aliases for consolidated user management documentation.
Updated menu structure to include new user management section.
8 files
Added new comprehensive guide for user management.
Removed outdated user group management documentation.
Removed outdated user creation documentation.
Removed outdated user search documentation.
Removed outdated user roles documentation.
Removed outdated password policy documentation.
Removed outdated API ownership documentation.
Removed outdated RBAC overview documentation.
1 files