auth

package
v1.8.4 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jun 25, 2024 License: Apache-2.0 Imports: 5 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

View Source
var (
	Permission_name = map[int32]string{}/* 105 elements not displayed */

	Permission_value = map[string]int32{}/* 105 elements not displayed */

)

Enum value maps for Permission.

View Source
var File_api_commons_auth_perms_proto protoreflect.FileDescriptor
View Source
var File_api_commons_auth_user_proto protoreflect.FileDescriptor

Functions

This section is empty.

Types

type AuthClaims

type AuthClaims struct {

	// AUTH0 user_id
	Auth0UserId string `protobuf:"bytes,1,opt,name=auth0_user_id,json=auth0UserId,proto3" json:"auth0_user_id,omitempty"`
	// ORG user_id
	OrgUserId string `protobuf:"bytes,2,opt,name=org_user_id,json=orgUserId,proto3" json:"org_user_id,omitempty"`
	// ORG ID
	OrgId string `protobuf:"bytes,3,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"`
	// API key used in this request for API-based endpoints
	ApiKey string `protobuf:"bytes,4,opt,name=api_key,json=apiKey,proto3" json:"api_key,omitempty"`
	// ORG Region ID
	RegionId string `protobuf:"bytes,5,opt,name=region_id,json=regionId,proto3" json:"region_id,omitempty"`
	// ??
	Name string `protobuf:"bytes,6,opt,name=name,proto3" json:"name,omitempty"`
	// Impersonation information
	Impersonate string `protobuf:"bytes,7,opt,name=impersonate,proto3" json:"impersonate,omitempty"`
	// P3 Client SID from "client" table
	ClientSid int64 `protobuf:"varint,1000,opt,name=client_sid,json=clientSid,proto3" json:"client_sid,omitempty"`
	// P3 Agent SID from "agent" table
	AgentSid int64 `protobuf:"varint,1001,opt,name=agent_sid,json=agentSid,proto3" json:"agent_sid,omitempty"`
	// Mapped to agent_sid
	LoginSid int64 `protobuf:"varint,1002,opt,name=login_sid,json=loginSid,proto3" json:"login_sid,omitempty"`
	// ActiveOrgId is the org being used in behalf of for the api call
	ActiveOrgId string `protobuf:"bytes,1100,opt,name=active_org_id,json=activeOrgId,proto3" json:"active_org_id,omitempty"`
	// contains filtered or unexported fields
}

AuthClaims is a proto mapping of the JWT Claims

func (*AuthClaims) Descriptor deprecated

func (*AuthClaims) Descriptor() ([]byte, []int)

Deprecated: Use AuthClaims.ProtoReflect.Descriptor instead.

func (*AuthClaims) GetActiveOrgId

func (x *AuthClaims) GetActiveOrgId() string

func (*AuthClaims) GetAgentSid

func (x *AuthClaims) GetAgentSid() int64

func (*AuthClaims) GetApiKey

func (x *AuthClaims) GetApiKey() string

func (*AuthClaims) GetAuth0UserId

func (x *AuthClaims) GetAuth0UserId() string

func (*AuthClaims) GetClientSid

func (x *AuthClaims) GetClientSid() int64

func (*AuthClaims) GetImpersonate

func (x *AuthClaims) GetImpersonate() string

func (*AuthClaims) GetLoginSid

func (x *AuthClaims) GetLoginSid() int64

func (*AuthClaims) GetName

func (x *AuthClaims) GetName() string

func (*AuthClaims) GetOrgId

func (x *AuthClaims) GetOrgId() string

func (*AuthClaims) GetOrgUserId

func (x *AuthClaims) GetOrgUserId() string

func (*AuthClaims) GetRegionId

func (x *AuthClaims) GetRegionId() string

func (*AuthClaims) ProtoMessage

func (*AuthClaims) ProtoMessage()

func (*AuthClaims) ProtoReflect

func (x *AuthClaims) ProtoReflect() protoreflect.Message

func (*AuthClaims) Reset

func (x *AuthClaims) Reset()

func (*AuthClaims) String

func (x *AuthClaims) String() string

type AuthenticatedUser

type AuthenticatedUser struct {

	// JWT Claims
	Claims *AuthClaims `protobuf:"bytes,1,opt,name=claims,proto3" json:"claims,omitempty"`
	// contains filtered or unexported fields
}

AuthenticatedUser is a proto serialized version of AuthUser. It can be used to pass all AuthUser information towards the backends

func (*AuthenticatedUser) Descriptor deprecated

func (*AuthenticatedUser) Descriptor() ([]byte, []int)

Deprecated: Use AuthenticatedUser.ProtoReflect.Descriptor instead.

func (*AuthenticatedUser) GetClaims

func (x *AuthenticatedUser) GetClaims() *AuthClaims

func (*AuthenticatedUser) ProtoMessage

func (*AuthenticatedUser) ProtoMessage()

func (*AuthenticatedUser) ProtoReflect

func (x *AuthenticatedUser) ProtoReflect() protoreflect.Message

func (*AuthenticatedUser) Reset

func (x *AuthenticatedUser) Reset()

func (*AuthenticatedUser) String

func (x *AuthenticatedUser) String() string

type Permission

type Permission int32

Permission enum contains the permissions to be used for access control.

const (
	// 0 explicitly means unspecified or invalid.
	Permission_PERMISSION_UNSPECIFIED Permission = 0
	// Enables viewing WIP or unreleased features in development.
	Permission_PERMISSION_DEV Permission = 1
	// Enables editing learning center materials.
	Permission_PERMISSION_LEARN_EDIT Permission = 10
	// Enables editing organization data using the organization tools.
	Permission_PERMISSION_ORG_EDIT Permission = 100
	// Enables viewing organization related views and data using the
	// organization tools.
	Permission_PERMISSION_ORG_VIEW Permission = 101
	// Enables user account imitation for users within the p3 client hierarchy.
	Permission_PERMISSION_OWNING_ORG_IMITATION Permission = 130
	// Enables ability to create users.
	Permission_PERMISSION_USER_CREATE Permission = 118
	// Enables ability to edit users.
	Permission_PERMISSION_USER_EDIT Permission = 119
	// Enable ability for user to change their own password.
	Permission_PERMISSION_USER_EDIT_PASSWORD Permission = 120
	// Enable ability for user to change their user options.
	Permission_PERMISSION_USER_EDIT_OPTIONS Permission = 121
	// Allows viewing and editing delegated login connections.
	Permission_PERMISSION_LOGIN_CONNECTIONS Permission = 260
	// Allows viewing and editing of Agent Caller ID.
	Permission_PERMISSION_USER_EDIT_AGENT_CALLER_ID Permission = 122
	// Enables access to agent management app for assigning skills,
	// huntgroup, etc.
	Permission_PERMISSION_AGENT_MANAGEMENT Permission = 400
	// Enables creating and editing of permission groups.
	Permission_PERMISSION_PERMISSION_GROUP_EDIT Permission = 110
	// Enables ability to assign permission groups to users.
	Permission_PERMISSION_PERMISSION_GROUP_ASSIGN Permission = 111
	// Enables CRUD operations for Labels.
	Permission_PERMISSION_LABEL_MANAGEMENT Permission = 150
	// Enables attachment of labels to entities
	Permission_PERMISSION_LABEL_ATTACH Permission = 151
	// Enables CRUD operations for Trusts.
	Permission_PERMISSION_TRUST_MANAGEMENT Permission = 160
	// Enables access to get hunt group properties and settings.
	Permission_PERMISSION_HUNTGROUP_VIEW Permission = 1900
	// Enables access to update hunt group properties and settings.
	Permission_PERMISSION_HUNTGROUP_EDIT Permission = 1901
	// Enables access to get agent scripts properties and settings.
	Permission_PERMISSION_AGENT_SCRIPTS_VIEW Permission = 1950
	// Enables access to update agent scripts properties and settings.
	Permission_PERMISSION_AGENT_SCRIPTS_EDIT Permission = 1951
	// Enables access to get and list soundboard files.
	Permission_PERMISSION_SOUNDBOARD_VIEW Permission = 1700
	// Enables access to create, update, or delete soundboard files.
	Permission_PERMISSION_SOUNDBOARD_EDIT Permission = 1701
	// Enables user to view and mangage all org subscriptions.
	Permission_PERMISSION_SUBSCRIPTION_MANAGEMENT Permission = 140
	// Enables copying resources from one organization to another.  eg. Data Dip templates.
	Permission_PERMISSION_COPY_TO_ORGANIZATION Permission = 170
	// Enables the customer support tools.
	Permission_PERMISSION_CUSTOMER_SUPPORT Permission = 200
	// Enables user account imitation.
	Permission_PERMISSION_IMITATION Permission = 210
	// Enables editing data using billing related tools.
	Permission_PERMISSION_BILLING_EDIT Permission = 220
	// gives access to and editing of admin settings.
	Permission_PERMISSION_TCN_ADMIN_SETTINGS Permission = 230
	// Enables sensitive and specific billing tools for TCN employees only.
	Permission_PERMISSION_TCN_BILLING Permission = 240
	// Enables sensitive and specific billing tools for TCN employees only.
	Permission_PERMISSION_TCN_BILLING_ADMIN Permission = 241
	// Enables admin access to insights (TCN standard insights).
	Permission_PERMISSION_SUPPORT_TCN_INSIGHTS_ADMIN Permission = 250
	// Enables admin access to dashboards (TCN standard dashboards).
	Permission_PERMISSION_SUPPORT_TCN_DASHBOARDS_ADMIN Permission = 251
	// Enables access to agent.
	Permission_PERMISSION_AGENT               Permission = 300
	Permission_PERMISSION_ACCEPT_QUEUED_CALLS Permission = 310
	// Enables ability to view the campaign completion box.
	Permission_PERMISSION_VIEW_CAMPAIGN_COMPLETION Permission = 320
	// Ability to view voice mails for agents.
	Permission_PERMISSION_VIEW_VOICE_MAIL Permission = 321
	// Enabled access to scrublist options on calls.
	Permission_PERMISSION_AGENT_COMPLIANCE_SCRUBLIST_OPTIONS Permission = 330
	// Enables access to edit extensions.
	Permission_PERMISSION_EXTENSION_EDIT Permission = 1400
	// Enables downloading of voicemails.
	Permission_PERMISSION_VOICEMAIL_DOWNLOAD Permission = 1401
	// Enables agents to view manual approve tasks
	// Enables Agents to view portals.
	Permission_PERMISSION_AGENT_PORTALS_VIEW Permission = 340
	Permission_PERMISSION_MANUAL_APPROVE     Permission = 341
	// Enables Agents to view plugins.
	Permission_PERMISSION_AGENT_PLUGINS_VIEW Permission = 342
	// Enables Agents to view plugins.
	Permission_PERMISSION_AGENT_HUNTGROUP_INTEGRATIONS_VIEW Permission = 343
	// Enables agents to create manual conversations
	Permission_PERMISSION_MANUAL_CONVERSATION Permission = 344
	// Enables Agents to change their own hunt group
	Permission_PERMISSION_CHANGE_OWN_HUNT_GROUP Permission = 360
	// Enables Agents to change their own skill groups
	Permission_PERMISSION_CHANGE_OWN_SKILL_GROUPS Permission = 361
	// Enables access to voice analytics app.
	Permission_PERMISSION_VOICE_ANALYTICS Permission = 500
	// Enables access to managing flags within voice analytics.
	Permission_PERMISSION_VOICE_ANALYTICS_FLAG Permission = 501
	// Enables access to configuration within voice analytics.
	Permission_PERMISSION_VOICE_ANALYTICS_CONFIG Permission = 502
	// Enables ability to download recordings within voice analytics.
	Permission_PERMISSION_VOICE_ANALYTICS_RECORDING_DOWNLOAD Permission = 503
	// Enables ability to download transcripts within voice analytics.
	Permission_PERMISSION_VOICE_ANALYTICS_TRANSCRIPT_DOWNLOAD Permission = 504
	// Enables access to voice analytics screenRecording navigation.
	Permission_PERMISSION_VOICE_ANALYTICS_SCREEN_RECORDING Permission = 505
	// Enables ability to delete transcripts within voice analytics.
	Permission_PERMISSION_VOICE_ANALYTICS_TRANSCRIPT_DELETE Permission = 506
	// Enables ability to delete screen recordings.
	Permission_PERMISSION_VOICE_ANALYTICS_SCREEN_RECORDING_DELETE Permission = 507
	// Enables access to BI analytics app.
	Permission_PERMISSION_BUSINESS_INTELLIGENCE Permission = 600
	// Enables ability to view BI dashboards.
	Permission_PERMISSION_DASHBOARDS_VIEW Permission = 601
	// Enables ability to edit BI dashboards.
	Permission_PERMISSION_DASHBOARDS_EDIT Permission = 602
	// Enables writes for common library insights.
	// deprecated
	//
	// Deprecated: Marked as deprecated in api/commons/auth/perms.proto.
	Permission_PERMISSION_INSIGHTS_COMMON_LIBRARY_MANAGE Permission = 603
	// Enables access to insights.
	// deprecated
	//
	// Deprecated: Marked as deprecated in api/commons/auth/perms.proto.
	Permission_PERMISSION_INSIGHTS_MANAGE Permission = 604
	// allows access to read insights
	// deprecated
	//
	// Deprecated: Marked as deprecated in api/commons/auth/perms.proto.
	Permission_PERMISSION_INSIGHTS_INSIGHT_VIEW Permission = 605
	// allows access to edit insights
	Permission_PERMISSION_INSIGHTS_INSIGHT_EDIT Permission = 606
	// allows user to read insights for dashboards
	// deprecated
	//
	// Deprecated: Marked as deprecated in api/commons/auth/perms.proto.
	Permission_PERMISSION_INSIGHTS_DASHBOARD_VIEW Permission = 607
	// allows user to edit insights for dashboards
	// deprecated
	//
	// Deprecated: Marked as deprecated in api/commons/auth/perms.proto.
	Permission_PERMISSION_INSIGHTS_DASHBOARD_EDIT Permission = 608
	// Enables write access to automated reports
	Permission_PERMISSION_REPORT_GENERATOR_EDIT Permission = 609
	// Enables access to room 303 chat at a base level
	// Lowest tier permissions for unconfigured rooms and direct messaging
	Permission_PERMISSION_ROOM303 Permission = 700
	// Provides middle level permissions for unconfigured
	// rooms and direct messaging in room303
	Permission_PERMISSION_ROOM303_MEMBER Permission = 701
	// Provides top level permissions rooms and direct
	// messaging for all users in room303
	Permission_PERMISSION_ROOM303_SUPERVISOR Permission = 702
	// Enables access to the call scripts builder app.
	Permission_PERMISSION_AGENT_CALL_SCRIPTS Permission = 800
	// Enables access to the compliance app.
	Permission_PERMISSION_COMPLIANCE Permission = 900
	// Enables access to compliance consent profiles .
	Permission_PERMISSION_COMPLIANCE_CONSENT Permission = 910
	// Enables access to viewing the List Management Services app.
	Permission_PERMISSION_LMS_VIEW Permission = 1000
	// Enables access to editing LMS properties.
	Permission_PERMISSION_LMS_EDIT Permission = 1001
	// Enables access to omni boss app.
	Permission_PERMISSION_OMNI_BOSS Permission = 1200
	// enables write access in omni boss app and dashboards.
	Permission_PERMISSION_OMNI_BOSS_EDIT    Permission = 1201
	Permission_PERMISSION_OMNI_PORTALS_VIEW Permission = 1210
	// Enables access to viewing the integrations app.
	Permission_PERMISSION_INTEGRATIONS_VIEW Permission = 1300
	// Enables access to integrations payment menu options.
	Permission_PERMISSION_INTEGRATIONS_PAYMENT Permission = 1301
	// Enables access to integrations journey menu options.
	Permission_PERMISSION_INTEGRATIONS_JOURNEY Permission = 1302
	// Enables ability for key creation - only used by SROs and account managers
	Permission_PERMISSIONS_INTEGRATIONS_KEY_CREATION Permission = 1310
	// Enables access to WFM app
	Permission_PERMISSION_WFM Permission = 1500
	// Enables access to the Agent Portal feature.
	Permission_PERMISSION_AGENT_PORTAL Permission = 1501
	// Enables access to the Adherence app as an Admin user.
	Permission_PERMISSION_WFM_ADHERENCE_ADMIN Permission = 1502
	// Enables access to the Adherence app as a Manager user.
	Permission_PERMISSION_WFM_ADHERENCE_MANAGER Permission = 1503
	// Enables access to the Adherence app as a Monitor user.
	Permission_PERMISSION_WFM_ADHERENCE_MONITOR Permission = 1504
	// Enables access to Scorecards app.
	Permission_PERMISSION_SCORECARDS Permission = 1600
	// Enables access to managing scorecards.
	Permission_PERMISSION_SCORECARDS_MANAGE Permission = 1601
	// Enables access to evaluating scorecards.
	Permission_PERMISSION_SCORECARDS_EVALUATE Permission = 1602
	// Enables access to flag eval features.
	Permission_PERMISSION_SCORECARDS_FLAG_EVAL Permission = 1603
	// Enables access to manage learning opportunities.
	Permission_PERMISSION_SCORECARDS_LEARNING_OPPORTUNITIES Permission = 1604
	// Enables access to Dev Tools app.
	Permission_PERMISSION_DEV_TOOLS Permission = 1800
	// Enables access to view delivery notifications.
	Permission_PERMISSION_DELIVERY_NOTIFICATIONS_VIEW Permission = 2000
	// Enables access to create, update, or delete delivery notifications.
	Permission_PERMISSION_DELIVERY_NOTIFICATIONS_EDIT Permission = 2001
	// ACCESS the Tickets APP: Routing, Listing the tickets, dashboard, reports.
	Permission_PERMISSION_TICKETS_APP Permission = 3100
	// Adds Extra Access to: EnableProject
	Permission_PERMISSION_TICKETS_ADMIN Permission = 3101
	// Enables access to workflows builder
	Permission_PERMISSION_WORKFLOWS Permission = 4000
	// Enables access to view PBX Manager.
	Permission_PERMISSION_PBX_MANAGER_VIEW Permission = 4100
	// Enables access to create, update, or delete in PBX Manager.
	Permission_PERMISSION_PBX_MANAGER_EDIT Permission = 4101
	// Enables access to the PBX Softphone Widget in the GlobalTopBar.
	Permission_PERMISSION_PBX_SOFTPHONE_WIDGET Permission = 4110
	// Enables access to viewing the main newsroom app and showing the popup
	// This permission will be give to orgs automatically, but can be removed
	// manually to opt out of newsroom notifications
	Permission_PERMISSION_NEWSROOM_VIEW Permission = 4199
	// Enables access to create, update, and archive in Newsroom manager
	Permission_PERMISSION_NEWSROOM_EDIT Permission = 4200
	// Enables access to publish in Newsroom manager
	Permission_PERMISSION_NEWSROOM_PUBLISH Permission = 4201
	// ACCESS the Contact Manager APP: Routing, Listing the Contact Manager, List,Get, KYC etc.
	Permission_PERMISSION_CONTACTMANAGER_ADMIN Permission = 5100
	Permission_PERMISSION_CONTACTMANAGER_APP   Permission = 5101
)

func (Permission) Descriptor

func (Permission) Descriptor() protoreflect.EnumDescriptor

func (Permission) Enum

func (x Permission) Enum() *Permission

func (Permission) EnumDescriptor deprecated

func (Permission) EnumDescriptor() ([]byte, []int)

Deprecated: Use Permission.Descriptor instead.

func (Permission) Number

func (x Permission) Number() protoreflect.EnumNumber

func (Permission) String

func (x Permission) String() string

func (Permission) Type

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL