You can specify run-time security properties for both Process and Schedule objects. These properties establish whether and how the system verifies user permissions when users attempt to access automation objects from the database.
Follow these steps:
Note: See the tooltips or the User Interface Reference for field descriptions.
The Process objects are typically designed to access other objects to read or run while it runs, such as when one process triggers another process. If it is enabled, the product uses run-time security to verify that the user (the owner or caller) has permissions to access the object. For example, User A has permissions to start a process. This process attempts to access Object B and Object C. The product cross-checks permissions for each object. If the run-time security determines that the user does not have permissions to Object B, the process fails.
a. From the Runtime Security field, click Enable.
b. Clear Run as Owner.
This option enforces run-time security rights with the identity of the user who starts the process instance.
a. From the Runtime Security field, click Enable.
b. Select Run as Owner.
This option enforces run-time security rights with the identity of the owner, regardless of who starts the process instance. This allows users to start a process that gains access to elements that the owner wishes to protect.
|
Copyright © 2014 CA.
All rights reserved.
|
|