Business Integration Solutions Documentation

Security Profiles

Security Profiles is a group of permissions to connect to an external service which contains settings depending on the authentication method/interface.

The security profile permissions in BIS allow users access to perform specific tasks in BIS.

The following permission sets are available.

  • TI-BIS-ESSENTIAL
  • TI-BIS-USER
  • TI-BIS-ADMIN

for more information please refer Permission sets for BIS

The Account and the type of authentication method are stored in these profiles.

  • BIS Users: can view and use security profiles, but cannot access their setup.
  • BIS Admins: can view, create & setup security profiles.

Manage

Create a Security Profile

Creating a security profile enables users to connect to an external system.

Security Profile page

  • Account The account name. An identifier which BIS users and admins can use to identify the correct profile.

  • Authentication Method 4 Authentication methods can be used

    Method Description
    SAS Key SAS Key authentication allows users to connect to external environment with limited access and permissions.
    API Key API Key authentication allows users to connect to external systems supporting api key authentication.
    Basic Auth Basic authentication with a username/password
    OAuth 2.0 OAuth 2.0 authentication allows users to connect to external systems supporting oauth 2.0 authentication.

Default Security Profiles

Default security profiles are applicable for all supported End points.

User can assign one security profile per endpoint.

Default Security Profiles.

Deafult security profile is automatically updated when we select respective endpoint.

please refer to

AZFilewriter end point

Default security profiles can be applied when importing configurations without existing security profiles