The policy demo collection request(s) that include "hwa" in the
description are intended to demonstrate how HWA repository
accesses for viewing are affected by policy.
Scope of policies under HWA
viewing and download of decrypted assets is subject to policy
viewing and download of encrypted assets is not subject to policy
ingestion is not subject to policy
The demonstration script, from a clean systems, is as follows.
From postman, establish the postman environment for policy
administration:
Import the policy generic collection
Import the poicy demo collection
Set the "local" environment.
From the policy generic collection, select and send the
GET request to get all sessions.
Examine the returned list, which should have be empty.
From HWA, log in (as the pre-defined user): neither ingestion
nor viewing may proceed without logging in.
From postman, verify that a "policy session" has been established.
From the policy generic collection, select and send the
GET request to get all sessions.
Examine the returned list, which should have be empty.
From HWA ingestion menu, ingest an item.
This should succeed, as it is not subject to policy.
From HWA repository view, attempt to view the previously ingested item.
This should fail, as no policy allowing the access has
been established.
From postman, install the hwa policy contract that allows access
by the pre-defined user.
From the policy generic collection, select and send the GET request
to get all contracts and examine the returned list, which
should be empty.
From the policy demo collection, select and send the POST request
that installs the contract.
From the policy generic collection, select and send the GET request
to get all contracts.
Examine the returned list, which should have a single
element, the contract just installed.
From HWA repository view, attempt to view the previously ingested item.
This should succeed, as a policy allowing the access has been
established.