Diagnose and resolve issues where Nextedy RISKSHEET cells appear read-only or save operations fail due to Polarion permission restrictions on work item fields.
Nextedy RISKSHEET enforces Polarion’s field-level permissions through configuration rather than API access:
RISKSHEET cannot access Polarion’s Read-only Fields property via API. You must use RISKSHEET’s Permissions Management system instead. Configuring read-only fields in Polarion’s UI will have no effect on RISKSHEET behavior.
Save and refresh - Save the configuration and reload your RISKSHEET
Verify enforcement - Test editing restricted fields to confirm visual locking appears
If checkInstanceFieldPermissions is not set or is false, RISKSHEET relies only on column configuration (readOnly: true) and system field protection. Field-level Polarion permissions are not enforced.
Scenario 1: Status Transition Blocked by Formula Mismatch
Symptom: Cannot change work item status; save fails with permission error even though you have workflow transition rights.Root cause: Formula-generated field (e.g., title) doesn’t match stored value, triggering permission validation failure.Resolution:
Compare stored vs. generated values - In Polarion, check if the work item’s title matches what the formula would generate
Correct mismatches - Either:
Update the stored value in Polarion to match formula output
Adjust the formula to match existing data
Temporarily remove the formula, save the status change, then restore it
After migrating between Polarion versions, field length limits may change. Titles truncated to 80 characters in older versions might generate 255-character formula outputs in newer versions, causing permission mismatches. Manually align stored values with formula outputs to resolve.
Scenario 2: Primary vs. Child Document Behavior Differences
Symptom: Some restricted fields show gray background (can’t edit), while others allow typing but fail on save.Expected behavior: Primary document work items enforce restrictions visually (gray cells), while child document items enforce restrictions at save time (error message).Resolution:
Understand the design - This behavioral difference is intentional:
Primary documents: Visual prevention (cell won’t open editor)
Child documents: Save-time prevention (editor opens, but save fails with error)
Check document structure - Identify whether the work item is in the primary document or a child document
Train users - Communicate this behavioral difference to prevent confusion when the same field behaves differently in different contexts
Symptom: Configured a column as editable, but it remains read-only.Root cause: System fields (id, type, project, outlineNumber, status, author, created, updated) are always read-only regardless of configuration.Resolution:
Accept the limitation - System fields cannot be edited through RISKSHEET
Use Polarion directly - To change work item type or project, use Polarion’s native interface
Remove conflicting configuration:
Copy
Ask AI
{ "columns": [ { "id": "id", "readOnly": false // This will be ignored—ID is always read-only } ]}
For fields that should always be read-only (not permission-dependent):
Copy
Ask AI
{ "columns": [ { "id": "calculatedRisk", "header": "Risk Level", "formula": "item.severity * item.occurrence", "readOnly": true // Explicitly mark as read-only }, { "id": "author", "header": "Created By", "readOnly": true // System field, but explicit is clearer } ]}
Columns with formulas are automatically set to readOnly: true even if you don’t specify it. Users cannot override formula-generated values through the grid.
Test with restricted role - Log in as a user with limited permissions
Attempt to edit restricted field - Click the cell that should be read-only
Confirm visual lock - For primary documents, the cell should have a gray background and not open an editor
Test child document behavior - For child documents, the editor may open, but save should fail with a clear error message
Verify allowed fields - Fields your role has permission to edit should open editors and save successfully
You should now see consistent permission enforcement matching your Polarion role configuration, with clear visual indicators for read-only fields in primary documents and error messages for child document restrictions.