Access Control

An efficient and secure system to protect the access to data is a key part of the security concept in CDA. Administrators can grant user and user groups access to the features, objects and views that they are entitled to see based on their role and responsibilities within their company.

Security at data level can be as broad as administrator access to a role, or as granular as “Read access to just one job in one specific folder between 8:00 am and 4:00 pm on Tuesdays”. Any user interaction with Jobs or Workflows is logged for easy viewing and reporting.

This page includes the following:

Segregation of Content Using Clients

Users, User Groups and objects are allocated to Clients, which are the largest organizational units in an Automation Engine system. Each Client can have an administrator user that manages the necessary authorizations. Only administrators of Client 0 (also called system Client) can create further Clients and carry out global configuration and maintenance activities.

Client 0 is already available after installation and system administrators can log in to it using the UC/UC user object with password UC. It is recommendable to change this password after the first login.

You can create up to 9999 Clients and configure them to depict your business as best suits you. A common way to do it is creating a Client per operational area, department, etc. For example, Client 1 for DEVELOPMENT (containing all developer Users are and the folders and objects they will have to work with), Client 2 for HR OPERATIONS (with all HR Users as well as their folders and objects), Client 3 for FINANCE OPERATIONS, etc. Another possibility is creating one Client per customer, or per type of customer.

Planning an efficient Client landscape that segregates content and access rights is the basis for a secure access to data. For more information, see Example: Creating a Basic Client/User Landscape.

Access Rights Based on User Roles

Automation specialists who design Workflows need access to Login objects that grant processes access to third party systems. However, they do not need rights to create and define those Login objects. Operators who monitor and analyze active and ended tasks do not need rights to define and edit the underlying objects.

The authorization system supports the separation of administration, design, implementation and operation, adding a security layer. This separation takes place at various levels:

Based on the User Group definition, administrators can then create catalogs for operators that facilitate their access to the views, objects and functions that they have rights to. Users can only see and work with these and have no access whatsoever to any other area of the system. For more information, see Example: Configuring the User Catalog.

ACL Aggregation

In order to reduce security management effort, the Automation Engine allows you to group objects through intelligent filter criteria, for example using object naming conventions. For more information, see Granting Automation Engine Authorizations.

Restrictions at Object and Folder Level

In addition, you can define authorizations for Users and User Groups at object level within every Client. This way it is possible to grant certain users exclusive access rights to a particular object.

Since folders are also objects, you can also control user access to them. However, take into account that specifying folder rights does not automatically prevent access to the objects stored in them. For example, if an object stored in a protected folder is used in a Workflow, users who have rights to edit the Workflow will also be able to edit the embedded object. Objects that should not be accessed by particular users should also be protected. For more information, see Folders (FOLD).

See also:

User Management: Defining and Managing the Authorization System