Two Permission Models
RISKSHEET enforces permissions through two distinct but complementary systems:Polarion Permissions (Base Layer)
Polarion’s native permission system controls:- Project Access: Whether a user can see a project at all
- Document Access: Which documents a user can open (including templates)
- Field Permissions: Which fields can be edited based on work item status and user role
- View Configuration: Which topics appear in the portal for specific user roles
RISKSHEET Licensing (Application Layer)
RISKSHEET adds a licensing tier on top of Polarion permissions:- Active Users: Have edit access within RISKSHEET (limited by license tier)
- Server Users: Have read-only view access (unlimited count)
Access Control Hierarchy
Permissions are evaluated in this order:- Polarion Project Access: Does the user have permission to view this project?
- Polarion Document Access: Can the user open this document or template?
- RISKSHEET License: Is the user in the Active User group?
- Polarion Field Permissions: Does the current work item status allow editing this field?
- RISKSHEET Configuration: Is the column marked as
readOnlyin the configuration?
| Scenario | Polarion Project | Polarion Field | RISKSHEET License | Result |
|---|---|---|---|---|
| User A | ✅ Access | ✅ Editable | ✅ Active User | Can edit |
| User B | ✅ Access | ✅ Editable | ❌ Server User | Read-only (license blocks) |
| User C | ✅ Access | ❌ Read-only | ✅ Active User | Read-only (Polarion blocks) |
| User D | ❌ No Access | N/A | ✅ Active User | Cannot view (Polarion blocks) |
Field-Level Permission Enforcement
Polarion’s “Read-only Fields” property (which restricts fields based on work item status and user role) does not automatically work with RISKSHEET due to API limitations. Instead, administrators must enable permission checking through configuration:- Primary document work items: Fields that violate Polarion permissions are visually disabled (grayed out)
- Child document work items: Fields appear editable, but save operations fail with an error message
If you configure read-only fields in Polarion’s workflow but don’t enable
checkInstanceFieldPermissions, users will be able to edit those fields in RISKSHEET even when they shouldn’t. Always verify this setting when implementing field-level restrictions.System Fields (Always Read-Only)
Certain fields cannot be edited through RISKSHEET regardless of permissions:- Work Item ID (
id): Generated by Polarion on creation - Type (
type): Can be selected during creation but not changed afterward - Project (
project): Determined by document location - Outline Number (
outlineNumber): Auto-generated hierarchy position - Author (
author): Set automatically on creation - Created/Updated timestamps: System-managed
Template and Document Permissions
A common access issue occurs when users cannot see or use RISKSHEET templates: Template visibility requires:- Project-level access to the project containing the template document
- Read permission for the template document itself
- The template path must be configured in project properties (
risksheet.templatePath)
- Topics configuration: Administration → Topics → verify RISKSHEET topic is assigned to relevant user roles
- View configuration: User’s current view includes the RISKSHEET topic
- Template location access: User has permission to the project folder where templates reside
View-Based Access
RISKSHEET visibility in the Polarion portal depends on view configuration, not just permissions. If a user can access a project but RISKSHEET doesn’t appear:- Check Administration → Topics for the project
- Verify the current view includes RISKSHEET in its topic list
- Ensure the user’s role is assigned to a view that includes RISKSHEET
Practical Implications
For Administrators
- Assign Active Users via Polarion user groups (
nextedy_risksheet_usersor similar) - Enable field permission checking with
checkInstanceFieldPermissions=truewhen using Polarion’s workflow-based field restrictions - Configure template paths in project properties and ensure users have access to template storage locations
- Verify view configurations include RISKSHEET topics for all relevant user roles
- Plan license capacity based on the number of users who need edit access (not total Polarion users)
For Users
- Read-only mode means either (a) you’re not in the Active User group, or (b) Polarion permissions restrict the field
- Template access issues usually stem from project-level permissions, not RISKSHEET configuration
- View-based visibility problems can be resolved by switching views or contacting your administrator
- Field save failures on child documents may indicate Polarion permission blocks, even if the field appears editable
Related Concepts
- Licensing Model explains the distinction between Active Users and Server Users in detail
- Architecture describes how RISKSHEET integrates with Polarion’s security layer
- Configuration Hierarchy covers template-level vs document-level configuration access
- Work Item Visibility and Levels explains which work items appear in the grid based on configuration