More about Operator ID data instances |
If you implement the LDAP authentication capability, the log-on process accesses a central LDAP directory for authentication and ignores the password in this Operator ID instance. However, an Operator ID data instance is still needed for each user.
When a requestor logs in, the extension point activity Code-Security.ApplicationProfileSetup runs as a late step. The standard activity with that name is an empty stub. Your application can override the standard activity to perform additional processing as required.
Using the optional security audit feature, your application can present in the History Details display information about which values were added, updated, or removed from an Operator ID instance. See How to enable security auditing for rule or data changes.
Operator ID passwords, like most other passwords in rule or
data forms, are saved as hashed values in the PegaRULES
database, using the MD5 message digest algorithm. If your
system contains only nodes with Version 5.1 or later, you can
set the prconfig.xml
file setting to provide added
password security. Add this line to the file:
<env name="crypto/v5oneway" value="true" />
Consult Configuration Settings Reference, a document available on the Pega Developer Network, for details on this and other crypto settings.
During log-in, the system copies most properties from the
Operator ID instance are to properties in the
pxRequestor
page of the clipboard. For
browser-based users, this information is also on the page named
OperatorID
.
However, the value of the password property pyPwdCurrent is always encrypted both on the clipboard and during log-in.
Standard log-in processing does not limit the number of sessions that one Operator ID can have open. In practice, Process Commander cannot reliably detect when a session ends, so internal records of which Operator IDs have activity sessions may overstate the true situation, and wrongly prevent users from an additional log-in.
After you save a new or updated Operator ID instance, the change may not be reflected on another node in a cluster until the Pega-RULES agent on that node performs the next system pulse — typically after no more than 60 seconds. Unlike instances of most other Data- classes, the system saves Operator ID instances into the rule cache. As a result, until the next time the rule cache is synchronized, one node may access a stale copy from its rules cache.
The system-maintains the property pyLastSignon as the date and time of the last successful login (using normal authentication) by this Operator ID, using a Declare Trigger rule. (Ordinarily, do not update this property value directly in your application.)
You can create Operator ID instances by important a Comma-Separated-Values (CSV) text file, such as created by Microsoft Excel. For an example, search for "Bulk Operator Load" in the Pega Exchange area of the Pega Developer Network. You may need to adapt and extend this example to meet local requirements.
Process Commander does not prohibit deletion of an Operator ID instance when there are open assignments on that operator's worklist, or when that Operator ID is referenced in another data instance (such as an organization unit or workbasket).
If a user is no longer active, rather than deleting the Operator ID instance, you can follow these steps:
You can't delete an Operator ID if the operator has rules checked out. Have the operator sign in, and delete or check in all rules in the operator's personal RuleSet.
division, organization, LDAP, role, rule cache, RuleSet list | |
Atlas — Initial Operator IDs |