...
Anchor | ||||
---|---|---|---|---|
|
Roles control user and group access to administrative functions within Universal Controller. A user or group that has been assigned a role has permission to perform any function defined for that role.
Permissions control user and group access to specific functions for specific types of Controller records.
Some roles have permissions for specific functions that can be assigned individually. For example, a user that has been assigned the 60030979 ops_agent_cluster_admin role has permission to perform all functions associated with Agent Clusters. A user that has not been assigned the 60030979 ops_agent_cluster_admin role still can be given permission to perform individual functions associated with Agent Clusters via the 60030979 Agent Cluster Permissions.
Conversely, since there is no role associated with Agents, permissions for a user to perform functions associated with Agents must be assigned specific 60030979 Agent Permissions.
Note | ||
---|---|---|
| ||
The 60030979 ops_admin role assigns a user permission to perform all functions. |
...
Each role is a predefined collection of administrative functions (see 60030979 Description of Roles, below). By assigning a role to a user or group, you automatically give that user or group all functions associated with that role.
...
Role Name | Available Functions | Contains Roles | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| All functions; this is the Universal Controller administrator role. The easiest way to assign full permissions to a user is to add the user to the Administrator Group, which by default is assigned the ops_admin role.
|
| |||||||||||
| Create, read, update, and delete agent clusters. | ||||||||||||
| Read Audits. | ||||||||||||
|
(Also see 60030979 and 60030979 Bundle Permissions and Promotion Target Permissions, below.) | ||||||||||||
| Create, update, and delete Dashboard Details with Everyone visibility; updating includes updating Dashboard visibility. | ||||||||||||
| Create, update, and delete Dashboard Details that are visible for a group in which this user is a member; updating includes updating Dashboard visibility. | ||||||||||||
| Create, update, delete Database Connections. | ||||||||||||
| Create, read, update, delete Email Connections. | ||||||||||||
| Create Filters with Everyone visibility. | ||||||||||||
| Create Filters that belong to a group of which this user is a member. | ||||||||||||
| Read Forecast Calendar, Forecasts List, and Forecast Details.
| ||||||||||||
| List Import/Export XML. | ||||||||||||
| Read and update LDAP Settings. | ||||||||||||
| |||||||||||||
| Create, update, and delete OMS Servers. | ||||||||||||
| Create, read, update, and delete PeopleSoft Connections. | ||||||||||||
| Accept bundles being promoted to a target server. (The Accept Bundle command is executed on the target server automatically as part of the Promote and Promote Bundle commands and does not involve user interaction.) | ||||||||||||
|
|
| |||||||||||
| Read, update, and delete Universal Controller system properties and Password Settings. | ||||||||||||
|
The Strict Report Create Constraints Universal Controller system property specifies whether or not to restrict report creation only to users with the ops_admin, ops_report_admin, ops_report_group, or ops_report_global role. |
| |||||||||||
| Create global reports. | ||||||||||||
| Create reports that belong to a group to which this user is a member. | ||||||||||||
| Publish reports. (This role was applicable only to the Controller 5.x release.) | ||||||||||||
| Restore old versions of records. | ||||||||||||
| Create, read, update, and delete SAP Connections. | ||||||||||||
| Run Server Operations. | ||||||||||||
|
| ||||||||||||
| Create, read, update, and delete SNMP Managers, to which the Controller sends SNMP notifications. | ||||||||||||
| Read and update Single Sign-On Settings. | ||||||||||||
| Create, read, update, and delete Universal Event Templates. |
| |||||||||||
| Read Universal Event Templates. | ||||||||||||
| Create, read, update, and delete Universal Templates (including Universal Template Event Templates). |
| |||||||||||
| Read Universal Templates (including Universal Template Event Templates). | ||||||||||||
| Create, read, update, and delete users and groups. | ||||||||||||
| Create, update, and delete Widgets. |
...
You can further narrow down which records each permission applies to by specifying either name parameters or Business Services. For example, a given permission might apply only to tasks whose name begins with "SF," or a permission might apply only to tasks that have been assigned to a specific Business Service or to tasks that do not belong to any Business Services. See 60030979 General Permissions Field Descriptions, below, for more details.
...
The following fields of information and buttons display in the Permissions Details for all Permission types:
Field Name | Description | ||||||
---|---|---|---|---|---|---|---|
Details | This section contains detailed information about the permission. | ||||||
| Applies this permission to records whose name matches the string specified here. Wildcards are supported. | ||||||
| Applies this permission both to records that belong to any Business Service and to records that do not belong to any Business Service. | ||||||
| Applies this permission to records that do not belong to any Business Service. If this option is enabled, the user / user group will have the defined permissions on all records that do not belong to any Business Service. | ||||||
| Applies this permission to records that are members of the selected Business Service(s). Click the lock icon to unlock the field and select Business Services. | ||||||
Metadata | This section contains Metadata information about this record. | ||||||
UUID | Universally Unique Identifier of this record. | ||||||
Updated By | Name of the user that last updated this record. | ||||||
Updated | Date and time that this record was last updated. | ||||||
Created By | Name of the user that created this record. | ||||||
Created | Date and time that this record was created. | ||||||
Buttons | This section identifies the buttons displayed above and below the Permissions Details that let you perform various actions. | ||||||
Save | Saves a new record in the Controller database. | ||||||
Save & New | Saves a new record in the Controller database and redisplays empty Details so that you can create another new record. | ||||||
Update |
| ||||||
Delete |
| ||||||
Refresh | Refreshes any dynamic data displayed in the Details. | ||||||
Close | For pop-up view only; closes the pop-up view of this record. |
...
(You also can assign Agent Cluster Permissions to a user by assigning the 60030979 ops_agent_cluster_admin role to the user.)
Options | Description | ||
---|---|---|---|
Create | Grants permission to create a new Agent Cluster. | ||
Read | Grants permission to read an Agent Cluster definition.
| ||
Update | Grants permission to update an Agent Cluster definition. (Only certain fields can be updated.) | ||
Delete | Grants permission to delete an Agent Cluster. | ||
Commands |
|
...
(You also can assign Bundle Permissions to a user by assigning the 60030979 ops_bundle_admin role to the user.)
Options | Description |
---|---|
Create | Grants permission to create a Bundle matching both the specified name wildcard and business service membership, including the use of the Create Bundle By Date and Create Bundle By Business Service commands. |
Read | Grants permission to read a Bundle matching both the specified name wildcard and business service membership.
|
Update | Grants permission to update a Bundle matching both the specified name wildcard and business service membership, including the use of the Add To Bundle command. |
Delete | Grants permission to delete a Bundle matching both the specified name wildcard and business service membership. |
Commands |
For the ALL or Promote Bundle command:
|
...
(You also can assign Database Connection Permissions to a user by assigning the 60030979 ops_dba role to the user.)
Options | Description |
---|---|
Create | Grants permission to create a new Database Connection. |
Read | Grants permission to read a Database Connection. |
Update | Grants permission to update a Database Connection. |
Delete | Grants permission to delete a Database Connection. |
Execute | Grants permission to execute a task that requires a Database Connection. (Displays only if the Strict Connection Execute Constraints Universal Controller system property is true.) |
Commands |
|
...
(You also can assign Email Connection Permissions to a user by assigning the 60030979 ops_email_admin role to the user.)
Options | Description |
---|---|
Create | Grants permission to create a new Email Connection. |
Read | Grants permission to read an Email Connection. |
Update | Grants permission to update an Email Connection. |
Delete | Grants permission to delete an Email Connection. |
Execute | Grants permission to execute a task that requires an Email Connection. (Displays only if the Strict Connection Execute Constraints Universal Controller system property is true.) |
Commands |
|
...
(You also can assign OMS Server Permissions to a user by assigning the 60030979 ops_oms_admin role to the user.)
Options | Description |
---|---|
Create | Grants permission to create a new OMS Server. |
Read | Grants permission to read an OMS Server. |
Update | Grants permission to update an OMS Server. |
Delete | Grants permission to delete an OMS Server. |
Commands |
|
...
(You also can assign PeopleSoft Connection Permissions to a user by assigning the 60030979 ops_peoplesoft_admin role to the user.)
Options | Description |
---|---|
Create | Grants permission to create a new PeopleSoft Connection. |
Read | Grants permission to read a PeopleSoft Connection. |
Update | Grants permission to update a PeopleSoft Connection. |
Delete | Grants permission to delete a PeopleSoft Connection. |
Execute | Grants permission to execute a task that requires a PeopleSoft Connection. (Displays only if the Strict Connection Execute Constraints Universal Controller system property is true.) |
Commands |
|
...
(You also can assign Promotion Target Permissions to a user by assigning the 60030979 ops_promotion_admin role to the user.)
Options | Description |
---|---|
Create | Grants permission to create a Promotion Target matching both the specified name wildcard and business service membership. |
Read | Grants permission to read a Promotion Target matching both the specified name wildcard and business service membership. |
Update | Grants permission to update a Promotion Target matching both the specified name wildcard and business service membership. |
Delete | Grants permission to delete a Promotion Target matching both the specified name wildcard and business service membership |
Execute | Grants permission to promote a Bundle using a Promotion Target matching both the specified name wildcard and business service membership, assuming the user has both Read permission and Promote Bundle command permission for the Bundle. |
Commands |
|
...
(You also can assign SAP Connection Permissions to a user by assigning the 60030979 ops_sap_admin role to the user.)
Options | Description |
---|---|
Create | Grants permission to create a new SAP Connection. |
Read | Grants permission to read an SAP Connection. |
Update | Grants permission to update an SAP Connection. |
Delete | Grants permission to delete an SAP Connection. |
Execute | Grants permission to execute a task that requires an SAP Connection. (Displays only if the Strict Connection Execute Constraints Universal Controller system property is true.) |
Commands |
|
...
(You also can assign SNMP Manager Permissions to a user by assigning the 60030979 ops_snmp_admin role to the user.)
Options | Description |
---|---|
Create | Grants permission to create a new SNMP Manager. |
Read | Grants permission to read an SNMP Manager. |
Update | Grants permission to update an SNMP Manager. |
Delete | Grants permission to delete an SNMP Manager. |
Execute | Grants permission to execute a task that requires an SNMP Manager. (Displays only if the Strict Connection Execute Constraints Universal Controller system property is true.) |
Commands |
|
...
This controls global variable access the following ways:
- Users with the 60030979 ops_admin role have full access to all global variables.
- Users with the 60030979 ops_promotion_admin role have Read access to all global variables.
- Create, Read, Update, and Delete permissions must be assigned to users explicitly if those permissions are not granted through the 60030979 or 60030979 ops_admin or ops_promotion_admin role.
- Only those global variables for which a user has Read permission will be visible from the Variables list.
- Only those global variables for which the Execution User of a task instance has Read permission will be available within the variable scope of a task instance.
- A Set Variable action for a global variable will require appropriate global variable Create or Update permission.
- CLI and Web Services APIs will require appropriate global variable permissions depending on whether the command will Read, Create, or Update a global variable.
- Create Bundle By Date command will only add a global variable to the bundle if the:
- Global variable qualifies for the specified date.
- User invoking the command has Read permission for that global variable.
...
- All users will have Read access to virtual resources.
- Users with the 60030979 ops_admin role will have full access to all virtual resources.
- Create, Update, Delete, and Execution permissions must be explicitly assigned to users if those permissions are not granted through the 60030979 ops_promotion_admin role.
- Only those virtual resources for which the Execution User of the task instance has Execute permission can be requested by the task instance. Any virtual resource requested by task instances with an Execution User that does not have Execute permission for that virtual resource will result in the task instance going into Start Failure status, with status description Execution for virtual resource "resource-name" prohibited due to security constraints.
- Set Virtual Resource Limit System Operation action will require appropriate virtual resource Update permission.
- CLI and Web Services APIs will require appropriate virtual resource permissions: Updating a virtual resource limit through the CLI and Web Services APIs will require virtual resource Update permission.
...
To export or import the Permissions For Group XML, you must have the 60030979 ops_admin role or the 60030979 and 60030979 ops_imex and ops_user_admin roles.
If the groups do not exist on the import system, they (and their Permissions) will be created there.
...