Configure access rights by specialization
If your use cases demand it, you can configure user access to features in greater detail.
About this task
Generally, you specify role and group access to features by topic type: topic, map, ditaval, Collaborative Review, etc. Most of the time this is sufficient. However, if you absolutely need to specify access at a more granular level, you can do so.
For example, if you need to specify different Lock permissions for maps vs. bookmaps, you can configure the Lock access right based on specialization.
When you opt to configure an access right using specializations, you must use the specializations for all the object types. In other words, you can't break the map object type out into map and bookmap but then use the general topic object type. You must also break the topic object type out into topic, concept, task, reference, etc. You must also break all other object types out into their specializations, including object types like image, resource Collaborative Review, Snapshot, and so on. As you might imagine, this greatly increases the size and complexity of the access right.
Before configuring an access right using specializations, make sure you have a solid use case for this level of granularity.
<condition>
<!-- Object on which action is taken -->
<current>
<type name="map">
<statuses>
<status>Authoring:work</status>
</statuses>
</type>
</current>
<!-- Action user must be in this list -->
<users>
<roles>
<role name="Writer"/>
</roles>
</users>
</condition>
<condition>
<!-- Object on which action is taken -->
<current>
<type name="topic">
<statuses>
<status>Authoring:work</status>
</statuses>
</type>
</current>
<!-- Action user must be in this list -->
<users>
<roles>
<role name="Writer"/>
</roles>
</users>
</condition>
This is straightforward. Compare this example with the example in step 6 below.