Activity Authorisations can be configured to further restrict user access in addition to the View Authorisations. These activity Authorisations allow the actions the user can perform on visible objects can see to be restricted. The activities are broken down into 6 categories, with each category being controlled by a separate authorisation object:
Authorisation Object | Description |
---|---|
Y_TECONF | This authorisation object controls access to the configuration options within ActiveControl, such as creating Target systems and Paths |
Y_TEUSER | This authorisation object controls initial access to the ActiveControl GUI and certain activities allowable by user, such as the ability to delegate approval rights to another user. |
Y_TE_TASK | This authorisation object controls all activities that can be performed on a Task in ActiveControl, including creating, changing and assigning users. |
Y_TEFORM | This authorisation object controls all activities that can be performed on a Transport Form in ActiveControl, including creating, changing, releasing and assigning users. |
Y_TEIMORT | This authorisation object controls all activities concerning the import of transports into systems, including marking transports as imported manually and re-importing transports as required. |
Y_TEADMIN | This authorisation object controls access to the administrative functions within ActiveControl, including setting UModes on transports and manually changing the process flow of transports as required. |
These authorisation objects should be used to create the appropriate roles for each user type.
Activity Authorisation Object Details
Each authorisation object related to Activity Authorisations is detailed below. Only a sub-set of activity codes are valid for each authorisation object, and these are also shown below.
Authorisation Object | Field | Description | Valid Entries |
---|---|---|---|
Y_TECONF | /BTI/TE_OB | TE Configuration Object | TARGET, PATH, OTHERCONFIG, TARGETROLES, SCHEDULE, GROUP, TYPE, LABEL, PROJECT, FIELD, ADMIN, PAPPROVE, USERROLES, CHGSTEPTEMPLATE, CHGPATHSTEP, CHGPATH, USER, MANDATORYFIELD, TASKSTATUS |
Y_TECONF | /BTI/TE_AC | Activity Code | CREATE, CHANGE, DELETE |
Y_TEUSER | /BTI/TE_AC | Activity Code | DELEGATE, FORCEDELEGATE, CONFIGCHECK, CONFIG, APPROVEALL, TESTALL, VIEWCONIMPORTQUEUE, DEPLSTATUS, PLANSTATUS |
Y_TE_TASK | /BTI/TE_AC | Activity Code | CREATE, CHANGE, CHANGEASSIGNED, DELETE, LOCK, UNLOCK, ADDROLE, REMOVEROLE, ADDCHGPATH, REMOVECHGPATH, ADDTESTER, REMOVETESTER, CREATETR, CHANGETR, DELETETR, ADDTR, ADDUSER, REMOVEUSER, REMOVEFORM, CHGDEFAULTTESTER, CHGPATHSTEPUSER, TESTAPPROVE |
Y_TE_TASK | /BTI/TE_DS | Deployment Status | List the Deployment Statuses that the activity is permitted for or “*” for all |
Y_TE_TASK | /BTI/TE_PS | Planning Status | List the Planning Statuses that the activity is permitted for or “*” for all |
Y_TE_TASK | /BTI/TE_PR | Project | List the Projects that the activity is permitted for or “*” for all |
Y_TE_TASK | /BTI/TE_PT | Task Priority | List the Task Priorities that the activity is permitted for or “*” for all |
Y_TE_TASK | /BTI/TE_GP | Task Group ID | List the Task Group IDs that the activity is permitted for or “*” for all |
Y_TE_TASK | /BTI/TE_TY | Task Type ID | List the Task Type IDs that the activity is permitted for or “*” for all |
Y_TEFORM | /BTI/TE_AC | Activity Code | CREATE, CHANGE, CHANGEOTHERS, DELETE, LOCK, UNLOCK, RELEASE, RELEASEOTHERS, FORWARD, FORWARDOTHERS, ADDTASK, REMOVETASK, DELETEOTHERS |
Y_TEFORM | /BTI/TE_GP | Form Group ID | List the Form Group IDs that the activity is permitted for or “*” for all |
Y_TEFORM | /BTI/TE_TY | Form Type ID | List the Form Type IDs that the activity is permitted for or “*” for all |
Y_TEIMPORT | /BTI/TE_AC | Activity Code | IMPORT, BACKOUT, MARKASIMPORTED, ADDTOIMPORTQUEUE, RESETIMPORTSTATUS, MARKASMANUALLYAPPLIED |
Y_TEIMPORT | /BTI/TE_TR | Target role | List the Target Roles that the activity is permitted for or “*” for all |
Y_TEIMPORT | /BTI/TE_TA | Target ID | List the Target System IDs that the activity is permitted for or “*” for all |
Y_TEADMIN | /BTI/TE_AC | Activity Code | APPROVEANYWAY , ADDTOCONTROLPOINT, REMOVEIMPORTLOCK, STOPONERROR, ASSIGNSCHEDULE, SETUMODES |
Y_TEADMIN | /BTI/TE_TR | Target Role | List the Target Roles that the activity is permitted for or “*” for all |
Y_TEADMIN | /BTI/TE_TA | Target ID | List the Target System IDs that the activity is permitted for or “*” for all |
Y_TEADMIN | /BTI/TE_CP | Location | List the Locations that the activity is permitted for or “*” for all |
Post your comment on this topic.