Supply chain security documents are the what of BOMnipotent, users are the who. Unless you explicitly state otherwise, the hosted documents are only visible to those user accounts you grant access to.
BOMnipotent uses role-based access control (RBAC): Users have roles, and roles have
permissions
. After setup, BOMnipotent contains a few default roles. These are sufficient for managing the server, but to start accepting user request, you will probably want to
create
at least one new role.
Once that is done, a typical workflow for introducing a new user to your BOMnipotent system is as follows:
A new user
requests access
to your server. During this step, BOMnipotent Client sends a public key associated with the account to your server, where it is stored and marked as “requested”.
You
approve
the request. The new user account is now accepted as valid, but it does not have any permissions yet.
You
assign
one or more roles to the new user account.
Subsections of Access Management
Permissions
In BOMnipotent, permissions are not directly associated with user accounts, but rather with roles. The section about
role management
covers how this association is managed, and the section about
role assignment
explains how roles (and thus ultimately permissions) are assigned to users.
The server has several permissions embedded in its code, some of which are hardcoded, some of which are configurable, and all of which are explained here. To learn how to actually create a permission associated with a role, please refer to the
section
dedicated to exactly that topic.
Your customers are typically associated with one or more of your products. They will want to view all types of documents and information for that particular product, but they are not automatically entitled to information about other products.
PRODUCT_ACCESS
A permission with the value “PRODUCT_ACCESS(<PRODUCT>)” grants read permissions to any document associated with “<PRODUCT>”. This includes any BOM for that product, any vulnerabilities associated with these BOMs, and any CSAF documents covering this product.
For example, a role with the “PRODUCT_ACCESS(BOMnipotent)” could view (and only view) all documents associated with BOMnipotent.
It is possible to use the asterisk operator “*” to glob product names. In that case, the asterisk matches an arbitrary number of symbols. For example, the permission “PRODUCT_ACCESS(BOM*ent)” would match “BOMnipotent” as well as the (fictional) products “BOMent” and “BOM-burรกrum-ent”, but not “BOMtastic” (because the latter does not end on “ent”).
Consequently, “PRODUCT_ACCESS(*)” allows the viewing of all documents.
Manager Permissions
For managers of documents, the situation is usually reversed: They need the permission to not only view but also modify the contents in the database. Their scope is typically not restricted to a specific product, but instead to a specific type of document. This is why the segregation of manager permissions takes another perspective.
BOM_MANAGEMENT
This permission allows the
uploading, modifying and deleting
of Bills of Materials (BOMs). It also automatically grants permission to view all hosted BOMs.
VULN_MANAGEMENT
This permission allows to
update and view
the list of vulnerabilities associated with any BOM.
CSAF_MANAGEMENT
Unsurprisingly, this permission allows the
uploading, modifying and deleting
of Common Security Advisory Format (CSAF) documents. It also automatically grants view permissions to all hosted CSAF documents.
ROLE_MANAGEMENT
With this permission, a user can
modify the permissions
of roles, which can have far reaching consequences, because the changes potentially affect many users.
BOMnipotent knows one hardcoded special role called “admin”. This role always has all permissions that can be given to users. Additionally, there are some tasks that can only be done by a user with the admin role:
Only admins can
give or remove
the admin role to or from other users. A special
tmp admin mechanism
exists to create the first admin for a freshly created BOMnipotent Server.
BOMnipotent uses a role-based access model (RBAC), in which users are associated with roles, and roles with permissions. While
permissions
are largely hardcoded into BOMnipotent, roles can be managed (almost) freely. This section explains how to do that.
To modify or even view roles and their permissions, your user account needs the ROLE_MANAGEMENT permission.
Default Roles
When you spin up your BOMnipotent Server for the first time, it creates several colourfully named default roles in the database:
There is a special role called “admin”, which is not listed among the other roles. The reason is that it is not part of the database, but of the BOMnipotent code itself. As such, it cannot be modified.
Because roles without permissions are meaningless, the two always come in pairs. There is no dedicated mechanism to create a new role: rather, you add a permission to a role, and henceforth it exists.
[INFO] Removed permission VULN_MANAGEMENT from role vuln_manager
Once you have removed the last role from a permission, that role does no longer exist.
To prevent oopsie-moments, BOMnipotent does not support deleting whole batches of role-permissions.
User Management
The first step when creating a new user is to request a new account. This step is described
elsewhere
, because it is relevant for managers and consumers alike.
From BOMnipotent’s point of view, a user is associated with a unique email address, which is used as an identifier, and a public key, which is used for authentication. This is all the data sent during the creation of a new user account.
After a new account has been requested, it is up to a user manager to approve or deny the request.
For most user interactions, including listing, you need the USER_MANAGEMENT permission.
Listing
To list all users in your database, call
bomnipotent_client user list
โญโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโฎ
โ User Email โ Status โ Expires โ Last Updated โ
โโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ admin@wwh-soft.com โ APPROVED โ 2026-03-23 04:51:26 UTC โ 2025-03-22 04:51:26 UTC โ
โ info@wildeheide.de โ REQUESTED โ 2026-03-23 03:52:21 UTC โ 2025-03-22 03:52:21 UTC โ
โฐโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโโโโโฏ
You can see the email addresses of the users and their stati.
A user that does not have the status APPROVED has no special permissions, no matter which roles they have.
An expiration date is also associated with each user, which is the point in time at which the public key is considered invalid and has to be renewed. The period for which a key is considered valid can
be freely configured
in the server config.
Approval or Denial
If you were expecting the user request, you can approve it via
bomnipotent_client user approve <EMAIL>
[INFO] Changed status of info@wildeheide.de to APPROVED
Analogously, you can decide agains allowing this user any special access:
bomnipotent_client user deny <EMAIL>
[INFO] Changed status of info@wildeheide.de to DENIED
It is possible to deny a user that has already been approved, effectively revoking the account.
Deleting
If you want to get rid of a user account alltogether, call
bomnipotent_client user remove <EMAIL>
[INFO] Deleted user info@wildeheide.de
Role Assignment
Roles are what connects users to permissions. Adding or removing roles to and from users indirectly controls to what extend users can interact with your BOMnipotent Server instance.
For your convenience, several
default roles
are created upon starting BOMnipotent Server for the first time. In addition, BOMnipotent knows of the
admin role
, which receives some special treatment.
To modify or even view user roles, your user account needs the USER_MANAGEMENT permission.
Listing
To list all roles of all users, call
bomnipotent_client user-role list
โญโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโโโโโโโโโโโฎ
โ User Email โ User Role โ Last Updated โ
โโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
โ info@quantumwire โ bom_manager โ 2025-03-22 04:27:33.71579 โ
โ โ โ 7 UTC โ
โ info@wildeheide โ bom_manager โ 2025-03-22 04:26:08.83708 โ
โ โ โ 3 UTC โ
โฐโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโโโโโโโโโโโฏ
Adding
To add a new role to a user, call
bomnipotent_client user-role add <EMAIL> <ROLE>
[INFO] Added role to user
The user account needs to exist on the server at this point, the role does not.
Only users with the
admin role
can add the admin role to other users.