Authorization
header.
This is your Tyk Dashboard API Access Credentials, which can be found on the user detail page:
POST /api/users
endpoint, for example:
schemas
directory of your Tyk Dashboard installation folder, as follows:
schemas/password.json
schemas/developer_password.json
./schemas/basic_auth.json
minLength
- sets minimum password lengthmultiCase
- boolean, upper and lower case characters are requiredminNumeric
- minimum number of numeric charactersminSpecial
- minimum number of special characters, like @
, $
, %
etc.disableSequential
- boolean, disable passwords which include at least 3 sequential characters. For example: abc
, 123
, 111
, xxx
etc.password.json
file, with all options turned on:
true
:
"IsAdmin":"true"
, the user is an adminIsAdmin
) are: read
or write
; to deny access to a property you must remove the property from the user_permissions
objectIsAdmin
to true
or by setting no properties in the user_permissions
object.
denied
sections or screens hidden or disabled. Note that some side-effects can occur if pages that make use of multiple APIs to fetch configuration data cross over e.g. policies and API Definition listings.
Selecting the Account is Admin checkbox from the Dashboard gives the user full access (it has the same effect as the IsAdmin
property).
security.additional_permissions
map in the Tyk Dashboard configuration file.
"apis": "write"
"apis": "write"
"analytics": "read"
write
access only to API1
TeamB will have API write
access only to API2
TeamAnalytics will have Analytics read
access to both APIs
enable_ownership
to true
in your tyk_analytics.conf
TYK_DB_ENABLEOWNERSHIP
environment variable to true
analytics
permission in the user or user group access control configuration. The default behavior of this control is to grant or restrict access to all traffic analytics and does not take into account API ownership.
The additional owned_analytics
permission was added in Tyk Dashboard v5.1 (and LTS patches v4.0.14 and v5.0.3) to provide more granular access to traffic analytics. By configuring this permission, the user (or user group) will gain visibility only of those analytics that can be filtered by API (due to the method Tyk Pump uses to aggregate the analytics records).
Currently, only API Usage and Error Counts are available to users with the owned_analytics
permission.
Note that the owned_analytics
permission depends upon the analytics
permission being granted (set to read
) - without this, the more granular control is ignored and the user will not have visibility of any Tyk Dashboard analytics.
In the Dashboard UI, the control for owned_analytics
is implemented as a drop-down option (all
or owned
) on the analytics
permission.
x
next to their name in the drop-down/selection box.
Method | Endpoint path | Action |
---|---|---|
PUT | /api/apis/{apiID}/access | Assign a list of owners to the specified API |
GET | /api/apis/{apiID}/access | Retrieve the list of owners of the specified API |
user_owners
and user_group_owners
fields in the API definition and then updating the API in Tyk with that using these endpoints:
Method | Endpoint | Action |
---|---|---|
PUT | /api/apis/{apiID} | Update the API definition for the specified API - CRUD API owners in the user_owners and user_group_owners fields |
GET | /api/apis/{apiID} | Retrieve the API definition for the specified API - ownership details are included in user_owners and user_group_owners fields |
true
:
"enable_multi_org_users"
in tyk_analytics.conf
TYK_DB_ENABLEMULTIORGUSERS
environment variabletrue
:
"sso_enable_user_lookup"
in tyk_analytics.conf
TYK_DB_SSOENABLEUSERLOOKUP
environment variable