Adding new admin users? #2739
Replies: 5 comments 2 replies
-
|
Hi @EricWilson-BluePrism, welcome. The UI has not quite caught up for certain things like this. There is definitely a defect here (I'm creating one now, I'll have details shortly). The workaround for the issue is to use the Swagger UI: https:///docs#/RBAC/list_roles_rbac_roles_get to get the id of the admin role and then the https:///docs#/RBAC/assign_role_to_user_rbac_users__user_email__roles_post with user_email equal to the new user's email and the payload: If you have a way to look at the database behind the scenes, what's missing is an entry in the user_roles table to link your newly generated user to the global administrator role - which in turn gives the catchall permission including admin.dashboard. |
Beta Was this translation helpful? Give feedback.
-
|
Hi @EricWilson-BluePrism, thanks for reporting this. Could you share your user role setup payload and the exact API/UI flow you used when creating the user? I’m going to verify user/role linkage behavior and close the gap if confirmed. |
Beta Was this translation helpful? Give feedback.
-
|
Hi @EricWilson-BluePrism, to expand on @brian-hussey's workaround — this is a known gap in the Admin UI. Creating a user and checking "administrator" in the UI does not automatically assign the Quick fix via API: # 1. Get the platform_admin role ID
curl -H "Authorization: Bearer $TOKEN" https://your-server/rbac/roles
# Look for the role with name "platform_admin"
# 2. Assign platform_admin role to the new user
curl -X POST \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
https://your-server/rbac/users/newuser@example.com/roles \
-d '{
"role_id": "<platform_admin role UUID>",
"scope": "global"
}'The
This UI gap is tracked and will be addressed in an upcoming release. Update: Opened #3501 to track this bug. |
Beta Was this translation helpful? Give feedback.
-
|
Hi @EricWilson-BluePrism, following up — this bug has been fixed. Issue #3501 ( If you're on the latest release, creating a user with the "administrator" checkbox in the Admin UI should correctly assign the If you're still on an older version, @brian-hussey's workaround via the Swagger UI remains the fix: # 1. Get the platform_admin role ID
curl -s -H "Authorization: Bearer $TOKEN" https://your-server/rbac/roles \
| jq '.[] | select(.name=="platform_admin") | .id'
# 2. Assign to user
curl -X POST -H "Authorization: Bearer $TOKEN" -H "Content-Type: application/json" \
"https://your-server/rbac/users/newuser@example.com/roles" \
-d '{ "role_id": "<role-id-from-step-1>", "scope": "global" }'This grants the |
Beta Was this translation helpful? Give feedback.
-
|
I hit this exact issue when I first stood up ContextForge last year. The Admin UI’s “administrator” checkbox only sets a flag; it doesn’t actually grant the First, grab the role ID: Then attach it to your new user (replace USER_ID and ROLE_ID): After that, the new admin should log in without the `admin.d.d |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Newb question. I've just deployed the basic docker image of ContextForge. I'm able to login using the default admin credentials, and I'm able to create a new user account. On that account, I checked the option to specify the user is an administrator, but when I try to login using that new account, I receive the following error response:
{"detail":"Insufficient permissions. Required: admin.dashboard"}
Where do I apply additional permissions/roles for a user as I don't see an option in the admin UI?
Beta Was this translation helpful? Give feedback.
All reactions