Granting Users/User Groups Authorizations to Folders/Objects

On this page you grant or deny rights to access and/or work with Automation Engine objects, files, execution data, reports, etc.

This topic provides information on the following:

Granting/Denying Authorizations

Rights consist of access permissions and restrictions. The rights of a user are based on an authorization profile and the authorization profiles of all groups to which the user belongs. On this page you grant or deny rights to the user.

Here you can grant rights for the following:

Field/Control Description
Grp.

This grants or denies access rights.

The Automation Engine provides 9 authorization groups that you can use to combine multiple sets of access rights. Access rights of the same group are connected via a logical OR. Access rights of different groups are connected via a logical AND.

NOT stands for access denial. It does not depend on an authorization group and applies in all cases.

Type

This specifies the object type (short name) to which this set of access rights applies.

The '*' wildcard character means that they apply to all object types.

Name

This specifies the object and/or the folder to which the access rights apply. It can contain up to 200 characters.

You have several possibilities here:

  • Leave this field empty.

    In this case, the access rights apply to ALL objects of the type selected in the previous column (for example, to all Workflows, to all PromptSets, etc.).

  • Enter the name of just one object.

    The access rights apply to just this object.

  • Enter the name of multiple objects.

    The names of the objects must be separated by commas. The access rights apply to only these objects.

You can use the wildcard characters ("*" for any number of characters and "?" for exactly one character).

Folder and subfolder paths must always start with a "\".
Example: "\PRODUCTION\MATERIAL.HANDLING"

When you create an object, the name of the object and/or folder you define here is compared with the name of the template object. If the names do not correspond, you are not able to create the object.

Agent* Filters for Agent names (this might be relevant for Job execution, File Transfer sources, etc.).

Maximum: 200 characters

You can use the following wildcard characters here:

  • "*" stands for any number of characters
  • "?" stands for exactly one character

This field can also include more than one filter. In this case, they must be separated by commas.

Login*

Filter for names of Login objects (job execution, file transfer source, registered job output files).

Maximum: 200 characters

You can use the following wildcard characters here:

  • "*" stands for any number of characters
  • "?" stands for exactly one character

This field can also include more than one filter. In this case, they must be separated by commas.

File Name (S)*

Filter for file names (file transfer source, registered job output files).

Maximum: 255 characters

You can use the following wildcard characters here:

  • "*" stands for any number of characters
  • "?" stands for exactly one character

This field can also include more than one filter. In this case, they must be separated by commas.

Agent (D)* Filter for agent names ( file transfer destination).

Maximum: 200 characters

You can use the following wildcard characters here:

  • "*" stands for any number of characters
  • "?" stands for exactly one character

This field can also include more than one filter. In this case, they must be separated by commas.

Login (D)* Filter for names of Login objects ( file transfer destination).

Maximum: 200 characters

The wildcard characters "*" and "?" can be used. This field can also include more than one filter. Several filters must be separated by commas.

File Name (D)* Filter for file names ( file transfer destination).

Maximum: 255 characters

You can use the following wildcard characters here:

  • "*" stands for any number of characters
  • "?" stands for exactly one character

This field can also include more than one filter. In this case, they must be separated by commas.

R Grants Read rights.

Opening objects and folders is possible. See also Read rights to folders for additional information

W Grants Write rights.

Modifying objects is possible. This right granted for folders has the effect that a user can create objects in it.

X Grants Execute rights.

Executing objects is possible.

D Grants Delete rights.

Deleting objects and folders is possible.

Links are not objects. If a user intends to delete a link, s/he requires write access to the folder in which this link is stored. No deletion right is required.

C Grants Cancel rights.

Canceling active objects is possible.

S Grants access to execution data
P Grants access to reports
M Grants Modify to Runtime rights
This allows the setting of trace options on Automation Engines or agents and the ending of  RemoteTaskManager and Event objects.

* These columns are not displayed by default. To see them, click on the header row to open the list of available columns. The visible ones are marked with a tick, the hidden ones are grayed out. Select the one you need to make it visible; click it again to hide it.

Note the following for using authorization filters for object attributes: If an object's attribute (such as Login) does not contain a value (""), the wildcard character * is used for comparison with filter lines. If an authorization line contains a particular filter for this attribute (Login), it is still checked.

Example

In the User object, you first define Grp. 1 to grant a user Read, Write, and Execution rights on all objects that contain TEST or PRE_PROD in their Name. Then you define Grp.2 to restrict these rights to Agent PSA only.

The user tries to execute the following Job Object (JOBS):

  1. PRE_PROD.JOBS.NO.GRANT not on Agent PSA

  2. TEST.JOBS.GRANT on Agent PSA

The user is denied access to the first job, while the second job ends normally on Agent PSA:

Required Permissions for Predefined Automic Objects

In order to execute certain predefined Automic objects, additional permissions have to be set for their internally referenced Include, PromptSet, and Variable objects. These objects' names all start with XC_, so you can give a user read access to them by adding XC_* in the Name field and checking the box in the R column as shown below:

Defining Authorizations to Folders and their Contents

Since Folders are also objects, you can use them to collect objects and grant/deny users and user groups permissions to them at folder level.

Take the following into account when defining folder authorizations:

Rights Applicable to Object Types

Each object type has different rights. For example, TimeZone objects cannot be executed, therefore the X-Execute right is ignored.

This table shows the rights you can use for the each object type:

Object type R W X D C S P M
CALE        
CALL
CLNT      
CODE          
CONN        
DASH          
DOCU          
EVNT
FILTER          
FOLD          
HOST  
HOSTG
HSTA          
JOBD
JOBF
JOBG
JOBI        
JOBP
JOBQ
JOBS
JSCH
LOGIN        
PERIOD          
PRPT          
QUEUE  
REPORT              
SCRI
SERV  
STORE          
SYNC  
TZ          
USER    
USRG          
VARA          
XLS          

See also: