Previous Topic

Next Topic

Book Contents

Book Index

Configure Application Security Rights

Security rights control access to Application functionality and are configured in the Security Group Manager in CSM Administrator (CSM Administrator>Security>Edit Security Groups). Use the Rights tab to configure the following Application functionality rights.

Right

Description (when selected Check Box)

Grant To:

Attachments?

Rights are organized by scope: Blueprint, Global, Role, Site, Team, and User.

Allows people working with Attachments on Business Objects and within the Attachment Manager in CSM to:

  • View: Access Attachments.
  • Add: Create Attachments.
  • Edit: Edit attachments.
  • Delete: Delete Attachments.

View/Run Only:

  • Users/Customers

All rights:

  • System administrators
  • Managers

Can customize Grids even if they don't support customization?

Allow: Allows selected Users to customize Grids (add/remove Fields and move columns) even if the Grid does not support customization.

  • System administrators
  • Managers
  • Advanced Users (Level 2 and 3 technicians)

Can customize Grids that support customization?

Allow: Allows selected Users to customize Grids that support customization.

  • System administrators
  • Managers
  • Users

Can import definitions from inside Managers?

Allow: Allows selected Users to import definitions (.ced files) into Managers so that you can share definitions between systems.

  • System administrators
  • Advanced Users (Level 2 and 3 technicians)

Can override the Task Pane definition?

Allow: Allows selected Users to override the default Task Pane options and configure your own personal User options.

  • System administrators
  • Managers
  • Advanced Users (Level 2 and 3 technicians)
  • Users

Can export definitions from inside Managers?

Allow: Allows selected Users to export definitions (.ced files) into Managers so that you can share definitions between systems.

  • System administrators
  • Advanced Users (Level 2 and 3 technicians)

Can delete all records in a group?

Allow: Allows selected Users to delete all records in the current Search results group (ex: All Incidents).

  • System administrators

Run application?

Allow: Allows selected Users to run CSM.

  • System administrators
  • Managers
  • Users

Can modify settings governing scaling of Business Object forms?

Allow: Allows selected Users to edit the default scaling settings of Business Object forms (Form>Scale Form).

  • System administrators
  • Managers
  • Users

Table management?

Allow: Allows selected Users to access Table Management so that you can manage (create, edit, and delete) table/Field values directly from the CSM Desktop Client.

  • System administrators
  • Managers
  • Advanced Users (Level 2 and 3 technicians)

Can define custom toolbars?

Allow: Allows selected Users to create personal User toolbars.

  • System administrators
  • Managers
  • Advanced Users (Level 2 and 3 technicians)

Can modify settings governing scaling of Dashboards?

Allow: Allows selected Users to edit the default scaling settings of Dashboards.

  • System administrators
  • Managers
  • Users

Images?

Rights are organized by scope: Blueprint, Global, Role, Site, Team, and User.

Allows people working with application Images in CSM to:

  • View: Access Images.
  • Add: Import Images.
  • Edit: Edit Image properties.
  • Delete: Delete Images.

View Only:

  • Users/Customers

All rights:

  • System administrators
  • Managers

Notes:

  • Security design strategy is very important. Carefully consider the level of access to each scope. For more information, see the OOTB Security Design documentation.
  • Manager security rights control who can access the individual CSM Item Managers and are set separately (Managers category).
  • Security rights control who can access Application functionality. The Business Object tab of the Security Groups window (CSM Administrator>Security>Edit security groups) allows Users to configure access to Business Object/field data. While a User may have access to Application functionality, data may not be visible without Business Object rights.

To configure Application security rights:

  1. Open the Security Group Manager.
  2. In the Group drop-down, select the Security Group to configure security rights (ex: Admin).
  3. Click the Rights tab.
  4. In the Category drop-down, select Application.

    Applications Security Rights Window

  5. Click each Application right, and then select the appropriate check box Check Box to:
  6. Click Save Save Button.