Granting Automation Engine Authorizations

As an administrator, when you set up the system you create and configure User objects. On the Authorizations page you grant or deny rights to objects, files, execution data, reports, etc.

This page includes the following:

Granting/Denying Authorizations

Rights consist of access permissions and restrictions. The rights of a User are the sum of the authorizations defined on this page and on those that have been granted to the User Groups to which the User has been assigned.

Grant or deny authorizations by specifying first the objects, type of objects or groups of objects and selecting the individual rights the user should have.

* These columns are not displayed by default. To see them, click the arrow on the header row. This opens the list of available columns. The visible ones are marked with a tick, the hidden ones are grayed out. Select the one you need to make it visible; click it again to hide it.

Example

In the User object, you first define Grp. 1 to grant a user Read, Write, and Execution rights on all objects that contain TEST or PRE_PROD in their Name. Then you define Grp.2 to restrict these rights to Agent PSA only.

Table with the three rows. The first two rows assign Read, Write and Execute rights to objects where TEST occurs in the name. The third wor does the same for objects with PRE_PROD in the name.

The user tries to execute the following Jobs (see Jobs (JOBS)):

  1. PRE_PROD.JOBS.NO.GRANT not on Agent PSA

  2. TEST.JOBS.GRANT on Agent PSA

The user is denied access to the first job, while the second job ends normally on Agent PSA:

Authorization Filters for Object Attributes

If an object's attribute (such as Login) does not contain a value (" "), the wildcard character * is used for comparison with filter lines. If an authorization line contains a particular filter for this attribute (Login), it is still checked.

Example:

The object JOBS.TEST does not contain a Login object. The following lines are still used in the authorization check:

Grp Type Name Agent Login File Name (S) Agent (D) Login (D) File Name (D)
1 JOBS JOBS.TEST * LOGIN.* * * * *
1 JOBS JOBS.TEST * LOGIN.TEST.* * * * *

Required Permissions for Predefined CA Automic Objects

To execute certain predefined CA Automic objects, additional permissions have to be set for their internally referenced Include, PromptSet, and Variable objects.

The names of these objects start with XC_. You grant Users user Read access to them by adding XC_* in the Name field and checking the box in the R column.

Defining Authorizations to Folders and their Contents

Since Folders are also objects, you can use them to collect objects and grant/deny users and user groups permissions to them at folder level.

Take the following into account when defining folder authorizations:

Rights Applicable to Object Types

Each object type has different rights. For example, TimeZone objects cannot be executed, therefore the X-Execute right is ignored.

This table shows the rights you can use for the each object type:

Object type R W X D C S P M
CALE Y Y Y Y N N N N
CALL Y Y Y Y Y Y Y Y
CLNT Y Y N Y N Y Y N
CODE Y Y N Y N N N N
CONN Y Y Y Y N N N N
DASH Y Y N Y N N N N
DOCU Y Y N Y N N N N
EVNT Y Y Y Y Y Y Y Y
FILTER Y Y N Y N N N N
FOLD Y Y N Y N N N N
HOST Y Y N Y Y Y Y Y
HOSTG Y Y Y Y Y Y Y Y
HSTA Y Y N Y N N N N
JOBD Y Y Y Y Y Y Y Y
JOBF Y Y Y Y Y Y Y Y
JOBG Y Y Y Y Y Y Y Y
JOBI Y Y Y Y N N N N
JOBP Y Y Y Y Y Y Y Y
JOBQ Y Y Y Y Y Y Y Y
JOBS Y Y Y Y Y Y Y Y
JSCH Y Y Y Y Y Y Y Y
LOGIN Y Y Y Y N N N N
PERIOD Y Y N Y N N N N
PRPT Y Y Y Y N N N N
QUEUE Y Y Y Y N Y Y Y
REPORT N N N N Y N N N
SCRI Y Y Y Y Y Y Y Y
SERV Y Y N Y Y Y Y Y
STORE Y Y N Y N N N N
SYNC Y Y Y Y N Y Y Y
TZ Y Y N Y N N N N
USER Y Y N Y Y Y Y N
USRG Y Y N Y N N N N
VARA Y Y N Y N N N N
XSL Y Y N Y N N N N

See also: