Skip to main content
This page explains the conceptual model behind user roles in Risksheet, how permissions flow from Polarion through to the grid interface, and how licensing intersects with editing capabilities.

The Permission Layer Model

Risksheet does not define its own standalone user database. Instead, it inherits and extends the permission model already established in Polarion. Think of it as a series of gates that a user must pass through before they can perform an action in the risk grid: diagram Each gate narrows or grants access. A user who passes all gates with full permissions can create, edit, and delete risk items. A user who is blocked at the license gate can only view the data in read-only mode.

Polarion Project Roles

Before Risksheet even loads, Polarion’s own project roles determine what a user can do within a project. These roles are configured in Administration > User Management and include built-in roles such as:
Polarion RoleTypical Risksheet Impact
Project AdministratorFull configuration access, can edit risksheet.json, manage templates
Project UserCan create, edit, and delete risk items (subject to license gate)
Project ReaderRead-only access to the project and all documents
Custom RolesMapped to specific permissions via Polarion’s permission model
Risksheet respects these project-level permissions. If a user has only read access at the Polarion level, Risksheet will not allow editing regardless of the license or configuration settings.
Modifying Risksheet configuration settings such as risksheet.json requires a Polarion Admin role for the project. Non-admin users who need configuration changes must contact their project administrator to request modifications.

The License Gate: Active Users vs. Connect Users

Risksheet uses a license model that distinguishes between users who actively work with risk data and those who only need to view it. This distinction is controlled through a Polarion user group mechanism.

Active Users

An Active User is someone explicitly added to the nextedy_risksheet_users group in Polarion. Active Users receive full interactive capabilities:
  • Create new risk items and mitigation tasks
  • Edit cell values including severity, occurrence, and detection ratings
  • Add and remove upstream and downstream links
  • Use the context menu for row operations
  • Export to Excel and PDF
  • Participate in review workflows

Connect Users (Read-Only)

Any Polarion server user who is not a member of the nextedy_risksheet_users group automatically receives Connect (read-only) access. These users can:
  • View all risk data in the grid
  • Navigate between levels and documents
  • Use saved views to switch column visibility
  • View review status and comments
They cannot modify any data. The grid visually indicates read-only status, and save operations are blocked.
A common source of confusion is the difference between server users and Polarion license holders. Risksheet counts all registered users on the Polarion server as server users, regardless of their Polarion license type. This means users with ALM, QA, or even deactivated Polarion licenses still count toward the Risksheet server user total. If your organization has 200 registered Polarion users but only 50 hold active Polarion licenses, Risksheet still sees 200 server users.

How the User Group Works

The nextedy_risksheet_users group is a standard Polarion user group. Administrators create this group and add the email addresses of users who should have edit access. The license page in Administration > Risksheet displays:
  • Server Users: Total count of all registered users on the Polarion server
  • Configured Named Users: Count of users in the nextedy_risksheet_users group
  • License Capacity: Maximum named users allowed by your license tier
FieldValue
Server Users203
Configured Named Users7
License Capacity7 (Named License)
StatusACTIVE
Non-named usersRead-only (Connect) access

The canAdmin Property

The canAdmin property in the Risksheet configuration indicates whether the current user has administrative privileges for the configuration editor. When canAdmin is false (the default), the user cannot open or modify the risksheet.json configuration through the Risksheet interface. This property is typically evaluated dynamically based on the user’s Polarion project role. Project administrators automatically receive canAdmin = true, which grants access to:
  • The configuration editor within Risksheet
  • Template management operations
  • Document-level configuration overrides
In development or testing environments, setting nextedy.risksheet.disable_admin_check=true as a Polarion system property bypasses the admin permission requirement. Do not use this setting in production.

Read-Only Modes

Risksheet provides multiple levels of read-only enforcement, each serving a different purpose:

Sheet-Level Read-Only

Setting readonly to true in the configuration makes the entire sheet non-editable for all users, regardless of their role or license status. This is useful for archived documents, baseline views, or compliance snapshots that should not be modified.
{
  "readonly": true
}

Reviewer Mode

The reviewer property, when set to true, places the user in a restricted editing mode designed for review workflows. In reviewer mode:
  • Standard editing is disabled
  • Review-specific UI controls are shown
  • The user can approve, reject, or comment on risk items
  • The status bar shows the reviewer license message
The error message “You have read-only access only. (Reviewer License)” appears when a user attempts editing operations while in reviewer mode.

Column-Level Read-Only

Individual columns can be made read-only by setting readOnly to true in the column definition. This is automatically applied to:
  • Formula columns (columns with a formula property)
  • Server-rendered columns (columns with a serverRender property)
  • Reference columns
  • System fields: author, resolution, created, updated, type
Administrators can also explicitly set readOnly: true on any column to prevent user modifications while still displaying the data.

Downstream Read-Only

The downstreamReadonly property, when set to true, prevents editing of downstream linked items. This protects mitigation tasks and verification activities that originate from other documents, ensuring that edits to shared items occur only in their source location.

Field-Level Permission Enforcement

Risksheet supports fine-grained field-level permissions through the nextedy.risksheet.checkInstanceFieldPermissions project property. When this property is enabled (set to true), Risksheet evaluates Polarion’s field-level permissions for each work item instance.
Polarion’s built-in “Read-only Fields” UI property has no API that Risksheet can access. If you rely on this Polarion feature to restrict field editing based on work item status (for example, making fields read-only on approved items), those restrictions will not be enforced in the Risksheet grid. Instead, use the Permissions Management approach with nextedy.risksheet.checkInstanceFieldPermissions=true to control field editability based on work item state.
When checkInstanceFieldPermissions is enabled, the system evaluates each field for each work item individually. Fields that the current user does not have permission to modify appear as read-only in the grid. This integrates with Polarion’s workflow-based permission model where field editability can change based on the work item’s current status. diagram
There is a known behavior where items from child documents may show fields as editable in the grid but block the save operation. This occurs because the permission check evaluates at display time differently than at save time for child document contexts. A fix is planned for a future version.

Polarion View and Topic Configuration

Risksheet visibility in the Polarion navigation sidebar depends on the Risksheet topic being configured for the user’s active Polarion view (also called a “hat”). If the topic is missing from a view, users assigned to that view will be redirected to the space home page instead of seeing Risksheet. This is a common source of confusion that is frequently misidentified as an installation problem, a certificate issue, or a browser compatibility bug. The actual cause is always the topic configuration:
SymptomLikely Cause
Redirected to space home pageRisksheet topic not configured for user’s view
Risksheet works for some users but not othersDifferent users assigned to different views/hats
Risksheet disappears after updateTopic removed from custom view during update
XML parsing error on style.cssMissing topic in current view (not a browser issue)
To verify and fix topic configuration, navigate to Administration > Topics and ensure the <topic id='risksheet'/> entry is present for every view/role combination that needs access.
When Risksheet appears broken after an update or for specific users, always verify the Risksheet topic is enabled in the user’s current Polarion view before investigating browser issues, certificates, or server configuration. Ask the affected user which Polarion view (hat) they are using, then check Administration > Topics for that view.

System Fields and Protected Data

Regardless of the user’s role or permissions, certain system fields are always protected from modification through Risksheet:
Protected FieldReason
idWork item identity, managed by Polarion
statusControlled by workflow transitions, not direct editing
typeWork item type is immutable after creation
projectProject assignment is structural
outlineNumberDocument outline position, managed by Polarion
authorSet at creation time, not editable
resolutionControlled by workflow transitions
createdTimestamp, set automatically
updatedTimestamp, set automatically
Attempts to save changes to these fields are silently ignored by Risksheet. The grid may display these fields for informational purposes, but they are always rendered as read-only.

POWERSHEET Integration and License Relationship

When POWERSHEET is installed alongside Risksheet with a valid production license, additional features are automatically unlocked. This integration is transparent — no manual configuration is required. The system detects the POWERSHEET license and adjusts available capabilities accordingly. Key points about the integration:
  • Evaluation or trial POWERSHEET licenses do not enable the enhanced feature set
  • License changes are detected automatically without requiring a server restart
  • Both products can be licensed independently
  • When upgrading to version 25.11.0 or later with POWERSHEET installed, users must also be added to the nextedy_powersheet_users group for license alignment
After upgrading Risksheet to version 25.11.0 or later, if POWERSHEET is also installed, you may see 0 named users on the license page even if the nextedy_risksheet_users group is correctly configured. Create a nextedy_powersheet_users group and add the same users to resolve this. A Polarion service restart may be required for changes to take effect.

Practical Role Scenarios

The following table summarizes common organizational roles and their typical Risksheet permission configuration:
Organizational RolePolarion RoleLicense GroupConfig PropertiesEffective Access
Safety EngineerProject Usernextedy_risksheet_usersDefaultFull edit of risk items and tasks
Quality ManagerProject Usernextedy_risksheet_usersDefaultFull edit, exports, reviews
Risk AdministratorProject Adminnextedy_risksheet_userscanAdmin = trueFull edit plus configuration management
External AuditorProject ReaderNot in groupreadonly: trueRead-only view of all data
Review Board MemberProject Usernextedy_risksheet_usersreviewer: trueReview-specific actions only
StakeholderProject ReaderNot in groupDefaultRead-only Connect access
For step-by-step instructions on configuring user access, see:
Support TicketsSource Code
  • AppConfig.ts
  • RisksheetProjectProperties.java
  • PolarionAppConfigManager.java
  • GetSetUtil.java