Previous Topic: Permissions DependenciesNext Topic: How to Transition Roles Used in Active Directory to CA EEM


Filters for Permissions

CA EEM defines permissions as Resource Class actions. You can, optionally, use filters to limit the actions that you allow a group or user. For example, you can scope permissions so that they apply to the assigned group in the configured environment only.

The following Filters example illustrates the use of ENVIRONMENT as the named attribute for the filter. Policies that are defined with the Access Policies type let you add filters.

For the Left type, select named attribute with the value ENVIRONMENT. Use the String operator EQUAL  ==. Select value for the Right type and enter a value such as Default Environment.

The actions in the following table belong to policies based on the referenced resource class.

 

Action Key
(Localized Name)

Resource Class for Policy

Named Attribute for Filter

Object_List (List)

Object_Read (Read)

Object_Edit (Edit)

Object_Delete (Delete)

Object_Admin (Admin)

Object

SECURITY_CONTEXT_ID

SECURITY_CONTEXT_GRP

ENVIRONMENT

OBJECT_TYPE

Agenda_Control (Control)

Agenda

ENVIRONMENT

Dataset_Inspect (Inspect)

Dataset_Modify (Modify)

Dataset

ENVIRONMENT

Process_Control (Control)

Process_Monitor (Monitor)

Process_Start (Start)

Process

SECURITY_CONTEXT_ID

SECURITY_CONTEXT_GRP

ENVIRONMENT

Resources_Control (Control)

Resources

ENVIRONMENT

StartRequestForm_Start (Start)

StarRequestForm_Dequeue (Dequeue)

Start Request Form

ENVIRONMENT

Execute

TouchPoint Security

ENVIRONMENT

TOUCHPOINT