Documentation ¶
Index ¶
- Variables
- type AuthClaims
- func (*AuthClaims) Descriptor() ([]byte, []int)deprecated
- func (x *AuthClaims) GetActiveOrgId() string
- func (x *AuthClaims) GetAgentSid() int64
- func (x *AuthClaims) GetApiKey() string
- func (x *AuthClaims) GetAuth0UserId() string
- func (x *AuthClaims) GetClientSid() int64
- func (x *AuthClaims) GetImpersonate() string
- func (x *AuthClaims) GetLoginSid() int64
- func (x *AuthClaims) GetName() string
- func (x *AuthClaims) GetOrgId() string
- func (x *AuthClaims) GetOrgUserId() string
- func (x *AuthClaims) GetRegionId() string
- func (*AuthClaims) ProtoMessage()
- func (x *AuthClaims) ProtoReflect() protoreflect.Message
- func (x *AuthClaims) Reset()
- func (x *AuthClaims) String() string
- type AuthenticatedUser
- func (*AuthenticatedUser) Descriptor() ([]byte, []int)deprecated
- func (x *AuthenticatedUser) GetClaims() *AuthClaims
- func (*AuthenticatedUser) ProtoMessage()
- func (x *AuthenticatedUser) ProtoReflect() protoreflect.Message
- func (x *AuthenticatedUser) Reset()
- func (x *AuthenticatedUser) String() string
- type Permission
Constants ¶
This section is empty.
Variables ¶
View Source
var ( Permission_name = map[int32]string{}/* 105 elements not displayed */ Permission_value = map[string]int32{}/* 105 elements not displayed */ )
Enum value maps for Permission.
View Source
var File_api_commons_auth_perms_proto protoreflect.FileDescriptor
View Source
var File_api_commons_auth_user_proto protoreflect.FileDescriptor
Functions ¶
This section is empty.
Types ¶
type AuthClaims ¶
type AuthClaims struct { // AUTH0 user_id Auth0UserId string `protobuf:"bytes,1,opt,name=auth0_user_id,json=auth0UserId,proto3" json:"auth0_user_id,omitempty"` // ORG user_id OrgUserId string `protobuf:"bytes,2,opt,name=org_user_id,json=orgUserId,proto3" json:"org_user_id,omitempty"` // ORG ID OrgId string `protobuf:"bytes,3,opt,name=org_id,json=orgId,proto3" json:"org_id,omitempty"` // API key used in this request for API-based endpoints ApiKey string `protobuf:"bytes,4,opt,name=api_key,json=apiKey,proto3" json:"api_key,omitempty"` // ORG Region ID RegionId string `protobuf:"bytes,5,opt,name=region_id,json=regionId,proto3" json:"region_id,omitempty"` // ?? Name string `protobuf:"bytes,6,opt,name=name,proto3" json:"name,omitempty"` // Impersonation information Impersonate string `protobuf:"bytes,7,opt,name=impersonate,proto3" json:"impersonate,omitempty"` // P3 Client SID from "client" table ClientSid int64 `protobuf:"varint,1000,opt,name=client_sid,json=clientSid,proto3" json:"client_sid,omitempty"` // P3 Agent SID from "agent" table AgentSid int64 `protobuf:"varint,1001,opt,name=agent_sid,json=agentSid,proto3" json:"agent_sid,omitempty"` // Mapped to agent_sid LoginSid int64 `protobuf:"varint,1002,opt,name=login_sid,json=loginSid,proto3" json:"login_sid,omitempty"` // ActiveOrgId is the org being used in behalf of for the api call ActiveOrgId string `protobuf:"bytes,1100,opt,name=active_org_id,json=activeOrgId,proto3" json:"active_org_id,omitempty"` // contains filtered or unexported fields }
AuthClaims is a proto mapping of the JWT Claims
func (*AuthClaims) Descriptor
deprecated
func (*AuthClaims) Descriptor() ([]byte, []int)
Deprecated: Use AuthClaims.ProtoReflect.Descriptor instead.
func (*AuthClaims) GetActiveOrgId ¶
func (x *AuthClaims) GetActiveOrgId() string
func (*AuthClaims) GetAgentSid ¶
func (x *AuthClaims) GetAgentSid() int64
func (*AuthClaims) GetApiKey ¶
func (x *AuthClaims) GetApiKey() string
func (*AuthClaims) GetAuth0UserId ¶
func (x *AuthClaims) GetAuth0UserId() string
func (*AuthClaims) GetClientSid ¶
func (x *AuthClaims) GetClientSid() int64
func (*AuthClaims) GetImpersonate ¶
func (x *AuthClaims) GetImpersonate() string
func (*AuthClaims) GetLoginSid ¶
func (x *AuthClaims) GetLoginSid() int64
func (*AuthClaims) GetName ¶
func (x *AuthClaims) GetName() string
func (*AuthClaims) GetOrgId ¶
func (x *AuthClaims) GetOrgId() string
func (*AuthClaims) GetOrgUserId ¶
func (x *AuthClaims) GetOrgUserId() string
func (*AuthClaims) GetRegionId ¶
func (x *AuthClaims) GetRegionId() string
func (*AuthClaims) ProtoMessage ¶
func (*AuthClaims) ProtoMessage()
func (*AuthClaims) ProtoReflect ¶
func (x *AuthClaims) ProtoReflect() protoreflect.Message
func (*AuthClaims) Reset ¶
func (x *AuthClaims) Reset()
func (*AuthClaims) String ¶
func (x *AuthClaims) String() string
type AuthenticatedUser ¶
type AuthenticatedUser struct { // JWT Claims Claims *AuthClaims `protobuf:"bytes,1,opt,name=claims,proto3" json:"claims,omitempty"` // contains filtered or unexported fields }
AuthenticatedUser is a proto serialized version of AuthUser. It can be used to pass all AuthUser information towards the backends
func (*AuthenticatedUser) Descriptor
deprecated
func (*AuthenticatedUser) Descriptor() ([]byte, []int)
Deprecated: Use AuthenticatedUser.ProtoReflect.Descriptor instead.
func (*AuthenticatedUser) GetClaims ¶
func (x *AuthenticatedUser) GetClaims() *AuthClaims
func (*AuthenticatedUser) ProtoMessage ¶
func (*AuthenticatedUser) ProtoMessage()
func (*AuthenticatedUser) ProtoReflect ¶
func (x *AuthenticatedUser) ProtoReflect() protoreflect.Message
func (*AuthenticatedUser) Reset ¶
func (x *AuthenticatedUser) Reset()
func (*AuthenticatedUser) String ¶
func (x *AuthenticatedUser) String() string
type Permission ¶
type Permission int32
Permission enum contains the permissions to be used for access control.
const ( // 0 explicitly means unspecified or invalid. Permission_PERMISSION_UNSPECIFIED Permission = 0 // Enables viewing WIP or unreleased features in development. Permission_PERMISSION_DEV Permission = 1 // Enables editing learning center materials. Permission_PERMISSION_LEARN_EDIT Permission = 10 // Enables editing organization data using the organization tools. Permission_PERMISSION_ORG_EDIT Permission = 100 // Enables viewing organization related views and data using the // organization tools. Permission_PERMISSION_ORG_VIEW Permission = 101 // Enables user account imitation for users within the p3 client hierarchy. Permission_PERMISSION_OWNING_ORG_IMITATION Permission = 130 // Enables ability to create users. Permission_PERMISSION_USER_CREATE Permission = 118 // Enables ability to edit users. Permission_PERMISSION_USER_EDIT Permission = 119 // Enable ability for user to change their own password. Permission_PERMISSION_USER_EDIT_PASSWORD Permission = 120 // Enable ability for user to change their user options. Permission_PERMISSION_USER_EDIT_OPTIONS Permission = 121 // Allows viewing and editing delegated login connections. Permission_PERMISSION_LOGIN_CONNECTIONS Permission = 260 // Allows viewing and editing of Agent Caller ID. Permission_PERMISSION_USER_EDIT_AGENT_CALLER_ID Permission = 122 // Enables access to agent management app for assigning skills, // huntgroup, etc. Permission_PERMISSION_AGENT_MANAGEMENT Permission = 400 // Enables creating and editing of permission groups. Permission_PERMISSION_PERMISSION_GROUP_EDIT Permission = 110 // Enables ability to assign permission groups to users. Permission_PERMISSION_PERMISSION_GROUP_ASSIGN Permission = 111 // Enables CRUD operations for Labels. Permission_PERMISSION_LABEL_MANAGEMENT Permission = 150 // Enables attachment of labels to entities Permission_PERMISSION_LABEL_ATTACH Permission = 151 // Enables CRUD operations for Trusts. Permission_PERMISSION_TRUST_MANAGEMENT Permission = 160 // Enables access to get hunt group properties and settings. Permission_PERMISSION_HUNTGROUP_VIEW Permission = 1900 // Enables access to update hunt group properties and settings. Permission_PERMISSION_HUNTGROUP_EDIT Permission = 1901 // Enables access to get agent scripts properties and settings. Permission_PERMISSION_AGENT_SCRIPTS_VIEW Permission = 1950 // Enables access to update agent scripts properties and settings. Permission_PERMISSION_AGENT_SCRIPTS_EDIT Permission = 1951 // Enables access to get and list soundboard files. Permission_PERMISSION_SOUNDBOARD_VIEW Permission = 1700 // Enables access to create, update, or delete soundboard files. Permission_PERMISSION_SOUNDBOARD_EDIT Permission = 1701 // Enables user to view and mangage all org subscriptions. Permission_PERMISSION_SUBSCRIPTION_MANAGEMENT Permission = 140 // Enables copying resources from one organization to another. eg. Data Dip templates. Permission_PERMISSION_COPY_TO_ORGANIZATION Permission = 170 // Enables the customer support tools. Permission_PERMISSION_CUSTOMER_SUPPORT Permission = 200 // Enables user account imitation. Permission_PERMISSION_IMITATION Permission = 210 // Enables editing data using billing related tools. Permission_PERMISSION_BILLING_EDIT Permission = 220 // gives access to and editing of admin settings. Permission_PERMISSION_TCN_ADMIN_SETTINGS Permission = 230 // Enables sensitive and specific billing tools for TCN employees only. Permission_PERMISSION_TCN_BILLING Permission = 240 // Enables sensitive and specific billing tools for TCN employees only. Permission_PERMISSION_TCN_BILLING_ADMIN Permission = 241 // Enables admin access to insights (TCN standard insights). Permission_PERMISSION_SUPPORT_TCN_INSIGHTS_ADMIN Permission = 250 // Enables admin access to dashboards (TCN standard dashboards). Permission_PERMISSION_SUPPORT_TCN_DASHBOARDS_ADMIN Permission = 251 // Enables access to agent. Permission_PERMISSION_AGENT Permission = 300 Permission_PERMISSION_ACCEPT_QUEUED_CALLS Permission = 310 // Enables ability to view the campaign completion box. Permission_PERMISSION_VIEW_CAMPAIGN_COMPLETION Permission = 320 // Ability to view voice mails for agents. Permission_PERMISSION_VIEW_VOICE_MAIL Permission = 321 // Enabled access to scrublist options on calls. Permission_PERMISSION_AGENT_COMPLIANCE_SCRUBLIST_OPTIONS Permission = 330 // Enables access to edit extensions. Permission_PERMISSION_EXTENSION_EDIT Permission = 1400 // Enables downloading of voicemails. Permission_PERMISSION_VOICEMAIL_DOWNLOAD Permission = 1401 // Enables agents to view manual approve tasks // Enables Agents to view portals. Permission_PERMISSION_AGENT_PORTALS_VIEW Permission = 340 Permission_PERMISSION_MANUAL_APPROVE Permission = 341 // Enables Agents to view plugins. Permission_PERMISSION_AGENT_PLUGINS_VIEW Permission = 342 // Enables Agents to view plugins. Permission_PERMISSION_AGENT_HUNTGROUP_INTEGRATIONS_VIEW Permission = 343 // Enables agents to create manual conversations Permission_PERMISSION_MANUAL_CONVERSATION Permission = 344 // Enables Agents to change their own hunt group Permission_PERMISSION_CHANGE_OWN_HUNT_GROUP Permission = 360 // Enables Agents to change their own skill groups Permission_PERMISSION_CHANGE_OWN_SKILL_GROUPS Permission = 361 // Enables access to voice analytics app. Permission_PERMISSION_VOICE_ANALYTICS Permission = 500 // Enables access to managing flags within voice analytics. Permission_PERMISSION_VOICE_ANALYTICS_FLAG Permission = 501 // Enables access to configuration within voice analytics. Permission_PERMISSION_VOICE_ANALYTICS_CONFIG Permission = 502 // Enables ability to download recordings within voice analytics. Permission_PERMISSION_VOICE_ANALYTICS_RECORDING_DOWNLOAD Permission = 503 // Enables ability to download transcripts within voice analytics. Permission_PERMISSION_VOICE_ANALYTICS_TRANSCRIPT_DOWNLOAD Permission = 504 // Enables access to voice analytics screenRecording navigation. Permission_PERMISSION_VOICE_ANALYTICS_SCREEN_RECORDING Permission = 505 // Enables ability to delete transcripts within voice analytics. Permission_PERMISSION_VOICE_ANALYTICS_TRANSCRIPT_DELETE Permission = 506 // Enables ability to delete screen recordings. Permission_PERMISSION_VOICE_ANALYTICS_SCREEN_RECORDING_DELETE Permission = 507 // Enables access to BI analytics app. Permission_PERMISSION_BUSINESS_INTELLIGENCE Permission = 600 // Enables ability to view BI dashboards. Permission_PERMISSION_DASHBOARDS_VIEW Permission = 601 // Enables ability to edit BI dashboards. Permission_PERMISSION_DASHBOARDS_EDIT Permission = 602 // Enables writes for common library insights. // deprecated // // Deprecated: Marked as deprecated in api/commons/auth/perms.proto. Permission_PERMISSION_INSIGHTS_COMMON_LIBRARY_MANAGE Permission = 603 // Enables access to insights. // deprecated // // Deprecated: Marked as deprecated in api/commons/auth/perms.proto. Permission_PERMISSION_INSIGHTS_MANAGE Permission = 604 // allows access to read insights // deprecated // // Deprecated: Marked as deprecated in api/commons/auth/perms.proto. Permission_PERMISSION_INSIGHTS_INSIGHT_VIEW Permission = 605 // allows access to edit insights Permission_PERMISSION_INSIGHTS_INSIGHT_EDIT Permission = 606 // allows user to read insights for dashboards // deprecated // // Deprecated: Marked as deprecated in api/commons/auth/perms.proto. Permission_PERMISSION_INSIGHTS_DASHBOARD_VIEW Permission = 607 // allows user to edit insights for dashboards // deprecated // // Deprecated: Marked as deprecated in api/commons/auth/perms.proto. Permission_PERMISSION_INSIGHTS_DASHBOARD_EDIT Permission = 608 // Enables write access to automated reports Permission_PERMISSION_REPORT_GENERATOR_EDIT Permission = 609 // Enables access to room 303 chat at a base level // Lowest tier permissions for unconfigured rooms and direct messaging Permission_PERMISSION_ROOM303 Permission = 700 // Provides middle level permissions for unconfigured // rooms and direct messaging in room303 Permission_PERMISSION_ROOM303_MEMBER Permission = 701 // Provides top level permissions rooms and direct // messaging for all users in room303 Permission_PERMISSION_ROOM303_SUPERVISOR Permission = 702 // Enables access to the call scripts builder app. Permission_PERMISSION_AGENT_CALL_SCRIPTS Permission = 800 // Enables access to the compliance app. Permission_PERMISSION_COMPLIANCE Permission = 900 // Enables access to compliance consent profiles . Permission_PERMISSION_COMPLIANCE_CONSENT Permission = 910 // Enables access to viewing the List Management Services app. Permission_PERMISSION_LMS_VIEW Permission = 1000 // Enables access to editing LMS properties. Permission_PERMISSION_LMS_EDIT Permission = 1001 // Enables access to omni boss app. Permission_PERMISSION_OMNI_BOSS Permission = 1200 // enables write access in omni boss app and dashboards. Permission_PERMISSION_OMNI_BOSS_EDIT Permission = 1201 Permission_PERMISSION_OMNI_PORTALS_VIEW Permission = 1210 // Enables access to viewing the integrations app. Permission_PERMISSION_INTEGRATIONS_VIEW Permission = 1300 // Enables access to integrations payment menu options. Permission_PERMISSION_INTEGRATIONS_PAYMENT Permission = 1301 // Enables access to integrations journey menu options. Permission_PERMISSION_INTEGRATIONS_JOURNEY Permission = 1302 // Enables ability for key creation - only used by SROs and account managers Permission_PERMISSIONS_INTEGRATIONS_KEY_CREATION Permission = 1310 // Enables access to WFM app Permission_PERMISSION_WFM Permission = 1500 // Enables access to the Agent Portal feature. Permission_PERMISSION_AGENT_PORTAL Permission = 1501 // Enables access to the Adherence app as an Admin user. Permission_PERMISSION_WFM_ADHERENCE_ADMIN Permission = 1502 // Enables access to the Adherence app as a Manager user. Permission_PERMISSION_WFM_ADHERENCE_MANAGER Permission = 1503 // Enables access to the Adherence app as a Monitor user. Permission_PERMISSION_WFM_ADHERENCE_MONITOR Permission = 1504 // Enables access to Scorecards app. Permission_PERMISSION_SCORECARDS Permission = 1600 // Enables access to managing scorecards. Permission_PERMISSION_SCORECARDS_MANAGE Permission = 1601 // Enables access to evaluating scorecards. Permission_PERMISSION_SCORECARDS_EVALUATE Permission = 1602 // Enables access to flag eval features. Permission_PERMISSION_SCORECARDS_FLAG_EVAL Permission = 1603 // Enables access to manage learning opportunities. Permission_PERMISSION_SCORECARDS_LEARNING_OPPORTUNITIES Permission = 1604 // Enables access to Dev Tools app. Permission_PERMISSION_DEV_TOOLS Permission = 1800 // Enables access to view delivery notifications. Permission_PERMISSION_DELIVERY_NOTIFICATIONS_VIEW Permission = 2000 // Enables access to create, update, or delete delivery notifications. Permission_PERMISSION_DELIVERY_NOTIFICATIONS_EDIT Permission = 2001 // ACCESS the Tickets APP: Routing, Listing the tickets, dashboard, reports. Permission_PERMISSION_TICKETS_APP Permission = 3100 // Adds Extra Access to: EnableProject Permission_PERMISSION_TICKETS_ADMIN Permission = 3101 // Enables access to workflows builder Permission_PERMISSION_WORKFLOWS Permission = 4000 // Enables access to view PBX Manager. Permission_PERMISSION_PBX_MANAGER_VIEW Permission = 4100 // Enables access to create, update, or delete in PBX Manager. Permission_PERMISSION_PBX_MANAGER_EDIT Permission = 4101 // Enables access to the PBX Softphone Widget in the GlobalTopBar. Permission_PERMISSION_PBX_SOFTPHONE_WIDGET Permission = 4110 // Enables access to viewing the main newsroom app and showing the popup // This permission will be give to orgs automatically, but can be removed // manually to opt out of newsroom notifications Permission_PERMISSION_NEWSROOM_VIEW Permission = 4199 // Enables access to create, update, and archive in Newsroom manager Permission_PERMISSION_NEWSROOM_EDIT Permission = 4200 // Enables access to publish in Newsroom manager Permission_PERMISSION_NEWSROOM_PUBLISH Permission = 4201 // ACCESS the Contact Manager APP: Routing, Listing the Contact Manager, List,Get, KYC etc. Permission_PERMISSION_CONTACTMANAGER_ADMIN Permission = 5100 Permission_PERMISSION_CONTACTMANAGER_APP Permission = 5101 )
func (Permission) Descriptor ¶
func (Permission) Descriptor() protoreflect.EnumDescriptor
func (Permission) Enum ¶
func (x Permission) Enum() *Permission
func (Permission) EnumDescriptor
deprecated
func (Permission) EnumDescriptor() ([]byte, []int)
Deprecated: Use Permission.Descriptor instead.
func (Permission) Number ¶
func (x Permission) Number() protoreflect.EnumNumber
func (Permission) String ¶
func (x Permission) String() string
func (Permission) Type ¶
func (Permission) Type() protoreflect.EnumType
Click to show internal directories.
Click to hide internal directories.