LQE Access Control Configuration
Overview
When integrating SECollab with IBM Lifecycle Query Engine (LQE), it is important to control which ELM users can access SECollab
content through LQE. The SECollab Process data source exposes all projects in SECollab, so administrators must configure appropriate
access restrictions.
Prerequisites
Before configuring permissions, ensure that:
- Both SECollab AM and Process TRS feeds are registered in LQE
- LQE has completed initial indexing of SECollab resources
- You have administrator access to LQE
Configuration Steps
1. Identify Exposed Projects
- Navigate to the LQE administration interface at
https://<lqe_host_name>:<port>/lqe/web/admin
- Go to Access Control > Permissions
- Expand the "SECollab Process Resources (TRS 2.0)" node to view all exposed SECollab projects
- Review the list of projects that will be accessible through LQE
2. Create User Groups
The recommended approach involves creating separate ELM user groups for each exposed SECollab project:
- Navigate to Access Control > User Groups
- Click Add a new group
- Enter a descriptive name that clearly identifies the SECollab project (e.g., "SECollab - Project Alpha Users")
- Optionally add a description
- Save the user group
- Repeat for each SECollab project that requires access control
3. Assign Project Access to User Groups
- Return to Access Control > Permissions
- Expand the "SECollab Process Resources (TRS 2.0)" node
- Select a SECollab project from the list
- Click Add groups...
- Select the corresponding user group created in step 2
- Save the changes
- Repeat for each SECollab project
4. Add Users to Groups
- Navigate to Access Control > User Groups
- Select a user group
- Click Add a new user...
- Enter the ELM user ID of the user who should have access to the corresponding SECollab project
- Save the changes
- Repeat for all users who need access
- Repeat for all user groups
Result
Once configured, ELM users will have access to SECollab projects through LQE based on their user group membership. Users can only query and view data
from SECollab projects for which they have been granted access.
Best Practices
- Mirror SECollab Permissions: Align LQE user groups with SECollab's existing project permissions to maintain consistency
- Regular Audits: Periodically review user group memberships to ensure they remain current
- Naming Conventions: Use clear, consistent naming conventions for user groups to simplify administration
- Documentation: Maintain documentation of which user groups correspond to which SECollab projects
Troubleshooting
Users cannot see expected SECollab data:
- Verify the user is added to the correct user group in LQE
- Confirm the user group is assigned to the appropriate SECollab project in LQE permissions
- Check that the SECollab Process feed is active and up to date in LQE
Projects not appearing in Permissions:
- Ensure the SECollab Process TRS feed is properly registered in LQE
- Verify LQE has completed indexing the Process feed
- Check that the OAuth credentials are valid and the connection to SECollab is active