- Getting started
- Best practices
- Tenant
- About the Tenant Context
- Searching for Resources in a Tenant
- Managing Robots
- Connecting Robots to Orchestrator
- Storing Robot Credentials in CyberArk
- Storing Unattended Robot Passwords in Azure Key Vault (read only)
- Storing Unattended Robot Credentials in HashiCorp Vault (read only)
- Storing Unattended Robot Credentials in AWS Secrets Manager (read only)
- Deleting Disconnected and Unresponsive Unattended Sessions
- Robot Authentication
- Robot Authentication With Client Credentials
- SmartCard Authentication
- Configuring automation capabilities
- Audit
- Settings - Tenant Level
- Resource Catalog Service
- Folders Context
- Automations
- Processes
- Jobs
- Triggers
- Logs
- Monitoring
- Queues
- Assets
- Storage Buckets
- Test Suite - Orchestrator
- Other Configurations
- Integrations
- Host administration
- Organization administration
- Troubleshooting
Orchestrator User Guide
Access control
In Orchestrator, you use roles to control the level of access for users, groups, robot accounts, and external apps. On this page, we go over the notions you need to understand to effectively plan and implement your access control strategy:
- accounts and apps (i.e. user accounts, robot accounts, external apps) which represent the identity used to access Orchestrator resources
- roles, which are assigned to accounts in order to grant them explicit permissions within the UiPath ecosystem
- groups, which are used to simplify account administration by granting the same access to multiple user accounts
Accounts are not created and managed in Orchestrator, only their Orchestrator roles and assignments are. Accounts are created by organization administrators and, once created, they can be assigned to a folder or tenant in Orchestrator.
Orchestrator uses an access-control mechanism based on roles and permissions. Roles are collections of permissions meaning that the permissions needed to use certain Orchestrator entities are assigned to roles.
Role-permissions and user-roles relationships allow for a certain level of access to Orchestrator. A user gets the permissions required to perform particular operations through one or multiple roles. Since users are not assigned permissions directly, but only acquire them through roles, permission management involves assigning appropriate roles to the user.
There are two types of permissions, as follows:
- Tenant permissions define a user's access to resources at the tenant level.
- Folder permissions define the user's access and ability within each folder to which they are assigned.
- Folder permissions (tenant scoped):
- allow a user to create, edit, or delete all folders within the entire tenant.
- are typically granted to admins, or users responsible for managing the organization.
- Subfolder permissions (folder scoped):
- allow a user to create, edit, or delete a particular folder they are assigned to, along with any subfolders under it.
- offer more granular control, enabling users to manage specific folders without having control over the other folders in the tenant.
Based on the permissions they include, there are three types of roles:
- Tenant roles, which include tenant permissions, and are required for working at the tenant level.
- Folder roles, which include permissions to work within a folder.
- Mixed roles, which include both types of permissions.
With mixed roles, for a global operation, only the user's tenant permissions are taken into consideration. For a folder-specific operation, if a custom role is defined, folder permissions are applied in favor of any tenant permissions present.
Note: Mixed roles are no longer supported, and you cannot create new ones. If you have mixed roles, we recommend replacing them with a combination of tenant and folder roles to grant the required permissions.
The following resources are available to users, depending on the type of roles they have:
Tenant resources |
Folder resources |
---|---|
|
|
Auth.DisabledPermissions
parameter in UiPath.Orchestrator.dll.config.
Typically, you can select all available permissions (View, Edit, Create, or Delete) for any permission, except for the following, which have no effect for the listed permissions, and, therefore, you cannot edit them:
Permission type |
Permissions |
Unavailable permissions |
---|---|---|
Tenant |
Alerts |
|
Audit |
| |
Folder |
Execution Media |
|
Logs |
| |
Monitoring |
|
This is because, for example, it is not possible to edit system-generated logs.
Account lockout
By default, after 10 failed login attempts, you are locked out for 5 minutes.
System administrators can customize the Account Lockout settings from the host Management portal.