Configuring security group access to the views

To control whether members of a security group can view the process flow maps and CI topologies when they use the applications that contain these views, you go to the security group, specify the application to which to control access, and specify whether the flow map or topology view is available to group members.

About this task

Many users in your data center have no need to access these views. For example, members of the Process Requester security group (PMREQUESTER) typically do not need to view details about processes that are initiated at their request. Members of the Change Administrator group (PMCHANGEADMIN) might likewise have no need for these views. A Change Analyst (PMCHANGEANALYST), on the other hand, must be able to view the impact analysis topology; the CI configuration view might not be important for this user.

In the shipped product, some groups are granted access to one or more of the views by default. You can change the settings for these groups, add permission for other groups, and otherwise modify access to these views by security group.

The "Applications and graphical view actions" topic lists the applications that contain the views, along with the associated actions that determine whether the views are available.

To configure the security groups for access to the graphical views, perform the following steps:

Procedure

  1. Click Go To > Security > Security Groups to open the Security Groups application.
  2. In the list of the security groups that are defined for your environment, click the name of a group for which you want to grant or restrict access to a flow map or topology.

    For example, click PMREQUESTER to modify access for process requesters.

  3. Open the Applications tab to view applications, permissions, and actions that are can be granted or revoked for members of this security group.
  4. In the Applications section, click the name of the application that contains the applet view that you want to remove.

    For example, click Changes to control access to the impact analysis topology or Workplan Map, or both. The Options for application_name section lists basic permissions that are associated with this application. The lower part of the section lists individual actions that are available in the application.

  5. In the Options for Actions section, click the triangle beside Filter to open a query field, type Show in the field, and press Enter to display a list that contains Show Workplan Map, Show Topology Viewer, or both.
  6. Uncheck the box in the Grant Access column for the action that you want to revoke for members of the group.

    For example, uncheck Grant Access beside Show Workplan Map to revoke access to the flow map that is contained in this application. If you have revoked access and want to re-enable the view, check Grant Access.

  7. Repeat these steps for each of the applications that contain actions to which you want to revoke or grant access for this security group, and click Save to save the security group settings.

    Your new settings take effect for members of this security group after they log out and log back in.



Feedback