Example: Defining Authorizations at User Level

This topic describes a very basic way to define authorizations, namely, granting or denying access rights and privileges to objects directly to users.

In this example, an administrator creates two Users, JOHN and PETE, and assigns them rights and privileges in Client 100 (DEVELOPMENT). This is the Client in which the developers in the company design PromptSets, create Jobs, build Workflows, etc. The objects available in this Client are stored in folders.

JOHN and PETE have different responsibilities. They will be able to open and read all objects but, apart from that, they will have completely different rights.

Rights can be granted at object and at folder level. At object level means that administrators add objects one by one to the User Authorizations list and activate the corresponding CRUD rights. At folder level means that administrators can assign Users rights to all objects saved to a specific folder without having to add each end every object to the list.

What Will You Learn?

How to create User objects.

How to grant different Users different CRUD rights to the objects available in the Client.

How to deny rights to specific folders and objects.

How granting/denying rights to folders affects what users can see and do.

How to grant Users privileges to perspectives and functions.

Prerequisites

Create the First User Object.

JOHN will have full rights to DATAWAREHOUSE and its contents and restricted rights to MAINTENANCE and its contents. He will have no rights to HR.

  1. Log in to Client 100 using your administrator credentials.
  2. On the menu bar at the top of your screen click at the right hand side of the Home button.
  3. A dropdown menu opens that displays all the perspectives:

  4. Select Administration to open the Administration Perspective.
  5. On the Administration pane on the left hand side, click User Management to expand it.
  6. Click Users to display the list.
  7. Right-click anywhere on the list and select Add User from the context-menu or click the Add User button on the toolbar.
  8. On the Create User dialog enter JOHN and, optionally, the Department of the user (in our case, DEVELOPMENT) and click OK.

    The user is now saved to the Automation Engine database.

  9. The object definition pages open, displaying the User-specific page. This is where you add the JOHN's personal, credentials and other useful settings. Populating these fields is optional. We will leave them empty for this example.
  10. Expand the Automation Engine section on the left pane and select Authorizations.

    This is where you specify the folders, object types and (optionally) objects to which JOHN will have access as well as the CRUD rights you assign him.

    ClosedClick here to see a description of the columns and the options available for selection:

    Field/Control Description
    Grp.

    This grants or denies access rights.

    The Automation Engine provides 9 authorization groups that you can use to combine multiple sets of access rights. Access rights of the same group are connected via a logical OR. Access rights of different groups are connected via a logical AND.

    NOT stands for access denial. It does not depend on an authorization group and applies in all cases.

    Type

    This specifies the object type (short name) to which this set of access rights applies.

    The '*' wildcard character means that they apply to all object types.

    Name

    This specifies the object and/or the folder to which the access rights apply. It can contain up to 200 characters.

    You have several possibilities here:

    • Leave this field empty.

      In this case, the access rights apply to ALL objects of the type selected in the previous column (for example, to all Workflows, to all PromptSets, etc.).

    • Enter the name of just one object.

      The access rights apply to just this object.

    • Enter the name of multiple objects.

      The names of the objects must be separated by commas. The access rights apply to only these objects.

    You can use the wildcard characters ("*" for any number of characters and "?" for exactly one character).

    Folder and subfolder paths must always start with a "\".
    Example: "\PRODUCTION\MATERIAL.HANDLING"

    When you create an object, the name of the object and/or folder you define here is compared with the name of the template object. If the names do not correspond, you are not able to create the object.

    Agent* Filters for Agent names (this might be relevant for Job execution, File Transfer sources, etc.).

    Maximum: 200 characters

    You can use the following wildcard characters here:

    • "*" stands for any number of characters
    • "?" stands for exactly one character

    This field can also include more than one filter. In this case, they must be separated by commas.

    Login*

    Filter for names of Login objects (job execution, file transfer source, registered job output files).

    Maximum: 200 characters

    You can use the following wildcard characters here:

    • "*" stands for any number of characters
    • "?" stands for exactly one character

    This field can also include more than one filter. In this case, they must be separated by commas.

    File Name (S)*

    Filter for file names (file transfer source, registered job output files).

    Maximum: 255 characters

    You can use the following wildcard characters here:

    • "*" stands for any number of characters
    • "?" stands for exactly one character

    This field can also include more than one filter. In this case, they must be separated by commas.

    Agent (D)* Filter for agent names ( file transfer destination).

    Maximum: 200 characters

    You can use the following wildcard characters here:

    • "*" stands for any number of characters
    • "?" stands for exactly one character

    This field can also include more than one filter. In this case, they must be separated by commas.

    Login (D)* Filter for names of Login objects ( file transfer destination).

    Maximum: 200 characters

    The wildcard characters "*" and "?" can be used. This field can also include more than one filter. Several filters must be separated by commas.

    File Name (D)* Filter for file names ( file transfer destination).

    Maximum: 255 characters

    You can use the following wildcard characters here:

    • "*" stands for any number of characters
    • "?" stands for exactly one character

    This field can also include more than one filter. In this case, they must be separated by commas.

    R Grants Read rights.

    Opening objects and folders is possible. See also Read rights to folders for additional information

    W Grants Write rights.

    Modifying objects is possible. This right granted for folders has the effect that a user can create objects in it.

    X Grants Execute rights.

    Executing objects is possible.

    D Grants Delete rights.

    Deleting objects and folders is possible.

    Links are not objects. If a user intends to delete a link, s/he requires write access to the folder in which this link is stored. No deletion right is required.

    C Grants Cancel rights.

    Canceling active objects is possible.

    S Grants access to execution data
    P Grants access to reports
    M Grants Modify to Runtime rights
    This allows the setting of trace options on Automation Engines or agents and the ending of  RemoteTaskManager and Event objects.

    * These columns are not displayed by default. To see them, click on the header row to open the list of available columns. The visible ones are marked with a tick, the hidden ones are grayed out. Select the one you need to make it visible; click it again to hide it.

  11. Grant JOHN full rights to the DATAWAREHOUSE folder and its contents.

    You have two possibilities:

    • At folder level:

      This grants JOHN all rights to all objects contained in the folder.

    • At object level:

      This means that you add the objects available in DATAWAREHOUSE and activate the corresponding checkboxes for each:

  12. Grant JOHN restricted rights to the objects contained in the MAINTENANCE folder.

    He should be able to open and see the Workflows, their reports and their execution data but should not be able to modify anything. You have the following possibilities:

    • At folder level:

      This grants JOHN the same specific rights to all objects contained in the folder.

    • At object level:

  13. Deny JOHN access to the HR folder:

  14. Save your changes.

JOHN's Authorizations look either like this:

or like this:

Of course, you can also combine both ways to grant rights and use the folder and the object methods in one User definition.

Create the Second User Object.

PETE will have full rights to MAINTENANCE and its contents and restricted rights to DATAWAREHOUSE and its contents. He will have no rights to HR. In this example, we will use the folder method for him:

  1. Grant PETE full rights to the MANTENANCE folder and its contents.
  2. Grant PETE restricted rights to the objects contained in the DATAWAREHOUSE folder.
  3. Deny PETE access to the HR folder.
  4. Save your changes.

PETE's Authorizations look like this:

Assign the Users the Privileges they need to access perspectives and functions.

After assigning the access rights to folders and objects, you must make sure that users have the necessary rights to the perspective with which they will work and to the functions they will perform.

  1. Select Privileges on the left pane.

    ClosedClick here to see a description of all the available Privileges:

    Activate this checkbox ...

    ... to allow the user to

    Access to Explorer Folders

    Access to <No Folder>

    Open the <No Folder> folder.

    Restored and transported objects are available here. Having the right to <No Folder> gives users access to those objects.

    Access to recycle bin

    Access the Recycle Bin.

    Deleted objects are available here. Having this right allows users to restore deleted objects. Restored objects are then available in the <No Folder> folder.

    Access to transport case

    Access to the Transport case.

    Users with this privilege can open objects that should be transported to a different client or system. They can also delete objects from the Transport Case.

    Access to Version Management

    Access the Version Management folder and open (in read-only mode), restore and delete saved object versions. Execution data and reports are also available in this folder.

    Administration

    Change system status (STOP/GO)

    Change the status of the system and interrupt automatic processing.

    Create diagnostic information

    Set the trace options and display the Quarantine page and its contents in the Administration perspective.

    Execute system upgrades Perform system upgrades.
    FileEvents: Start without Login object specified

    Start FileSystem Events without using a Login object, that is, without entering specific user credentials.

    Granting or refusing this privilege affects the execution of FileSystem Events where the definition of a Login object is optional.

    FileTransfer: Start without Login object specified

    Start file transfers without using a Login object, that is, without entering specific user credentials. The Agent uses the credentials of the user who started it.

    Whether the Agent is allowed to process file transfers without Login object is specified in the UC_HOSTCHAR_DEFAULT variable, key ANONYMOUS_FT, see UC_HOSTCHAR_DEFAULT - Host Characteristics.

    ILM actions Access to the ILM pages (Partitions and History)and rights to configure ILM.
    Manage favorites on user group level

    Configure the User Catalog. The user can configure User Groups and add them to the User Catalog folder in the Process Assembly perspective.

    This way, the users included in a User Group will have rights to the objects to which the User Group gives access. These objects are the available in their My Catalog dashboard. See Configuring the User Catalog.

    SAP Criteria Manager

    Access to the SAP Criteria Manager via the Form page of SAP jobs.

    AWI Access Control
    Access to Administration Access to the Administration Perspective.
    Access to Analytics Access to Analytics.
    Access to Analytics for all clients Access to Analytics for all clients.
    Access to Dashboards Access the Dashboard.
    Access to Messages Access to messages.
    Access to Process Assembly Access to the Process Assembly perspective.
    Access to Process Monitoring Access to the Process Monitoring perspective.
    Access to My Catalog Access to the My Catalog.
    Advanced Editing
    Create and modify Backend variables

    Create and edit BACKEND Variables .

    Users who do not have this privilege can open these variables only in read-only mode.

    Create and modify SQL-Internal variables

    Create and modify SQL variables, both Secure and Internal (see SEC_SQL Variables and SEC_SQLI Variables)

    Pre-requisite

    The value in SQLVAR_INTERNAL must be YES (see UC_SYSTEM_SETTINGS - System-Wide Settings .

    If this privilege is not available, the variable type SQLI is not available for selection when creating variables. Internal SQL variables always open in read-only mode.

    Object properties: allow manually reset of 'Edit Hint'

    If a user opens an object for editing, the object is marked. If a program interruption occurs during the editing process, the object keeps this tag even if the Automic Web Interface is restarted. Privileged users can remove this tag.

    View Messages
    Dump memory trace See the Force memory trace dump button on the Messages and Request pane.

    View all messages from accorded client

    See all messages that are addressed to the client in which the user is defined.

    View messages from own user group

    See all messages that are addressed to the User Group of which the user is a member.

    View messages to administrators

    See messages that are addressed to administrators. They are not assigned to any specific user or client and inform about system-wide actions (such as a Server start).

    View security messages

    See security messages. These messages are not assigned to a specific user. They are created through the access check of the Authorization System.

    Access Control

    Access to Auto Forecast

    Access to the Auto Forecast function (automatic calculation of forecast data for tasks that will run within a specified period of time). See AutoForecast.

    Access to deactivated tasks

    Filter for deactivated tasks.

    Access to Administration

    Open the Administration Perspective, which provides access to system and security information and functions.

    Deal with authorizations at object level

    Specify or change exclusive access rights to objects.

    This right should be combined with write access (W) to the object. This is define at object level, see Managing Authorizations at Object Level.

    Logon via CallAPI Access the Automation Engine system via the Call Interface. This allows users to start tasks from within their own programs or via the utility.

    Modify the status of a task manually

    Change the status of tasks.

    The system does not check if the new status is a logical status. If status >= 1800 is set, the task ends.

    Take Over Task

    Tasks run under the user who has started them. For a different user than the owner user to be able to assume a task, he/she must have this privilege. The corresponding command is then displayed in the context menu. See Taking Over the Ownership of a Task.

    View server usage of all clients

    View the server process workload in the individual clients.

  2. Typically, developer users could have the privileges listed below, but of course this depends on your company's policy:

    Access to Explorer Folders

    • Access to Recycle Bin
    • Access to Version Management folder

    AWI Access Control

    • Access to Dashboards
    • Access to Messages
    • Access to My Catalog
    • Access to Process Assembly
    • Access to Process Monitoring

    View Messages

    • View all messages from accorded client

No matter in which client you create a User, it will automatically be available in Client 0 as well. Thus, Client 0 provides an overview of all the Users in your Automation Engine system. This means that you can create User either on their target Clients or on Client 0 and then move them to their Clients (see Moving Users (only available in client 0)).

See also: