Access and permissions
To access the Digital Twin Registry in your tenant’s workspace, you need — besides access to the tenant itself — the corresponding roles to work with the Digital Twin Registry.
Your tenant manager can grant you access and permissions, also for technical clients (technical users). As a tenant manager, handle user management with the Multitenant Access Control portal.
Available default roles for Digital Twin Registry:
Digital Twin Registry for Twins:
| Name | Description | Role key |
|---|---|---|
Twin Viewer |
Required to see the application and its contents in your tenant’s workspace. |
|
Twin Manager |
Additionally, with this role, users have Write permissions for Twins. |
|
Aspect Operator |
With this role, users have Write permissions for the Aspect APIs of the Twins. |
|
Digital Twin Registry for Asset Administration Shells:
| Name | Description | Role key |
|---|---|---|
AAS Viewer |
Required to see the application and its contents in your tenant’s workspace. |
|
AAS Manager |
Additionally, with this role, users have Write permissions for Asset Administration Shells. |
|
Submodel Access Reader |
With this role, users have Read permission for the AAS submodel-descriptor access endpoint. Only required for Eclipse Dataspace Connector (EDC) clients. |
|
AAS EDC BPN Viewer |
With this role, users have access-controlled Read permission for AAS resources in combination with EDC-BPN Header. Resource visibility depends on defined access rules. Only required for Eclipse Dataspace Connector (EDC) clients. |
|
Async Digital Twin Registry:
Name |
Description |
Role key |
Message Operator |
With this role, users have Read permission for message client credentials. |
|
As a developer, note that the URN (included in the token) for a role gets constructed as follows:
urn:macma-application-role:<tenant-id>:<client-id>:<role-key>
The placeholders mean:
-
<tenant-id>— Your tenant ID. -
<client-id>— Part of the credentials for your technical client. The client credentials were created when the corresponding module was created. See also Modules: Grant access for technical clients. -
<role-key>— Is indicated for each role in the role overview.