AuthorizationsLocate this document in the navigation structure

Use

You define authorizations to grant users the permissions to execute one or more permitted actions. The user can be an individual user, a group, or a role. In the ES Repository, you can define two types of authorizations: basic and advanced. The basic authorization allows you to assign simple actions such as read, write, delete, and so on, to users. However, if you want to assign granular permissions, you use the advanced authorizations.

Basic Authorizations

With basic authorizations, you can assign the following actions to users:

Action

Description

Edit Authorizations

Modify the authorizations defined in the ES Builder

Execute Reports

Run reports on the Process Component Interaction Models, and assign usage profiles to users

Write

Create, modify, and delete objects

Advanced Authorizations

Advanced authorization gives you the flexibility to assign granular permissions specific to roles. For example, for a developer working with service interfaces, you can provide permissions to only publish service interfaces.

With advanced authorizations, you can assign the following actions to users:

  • Publish service interfaces

  • Update underlying software component versions

  • Modify classifications

  • Create non-local software component versions

  • Take over change list

  • Generate Java proxy

  • Export

  • Import

  • Transfer

  • Write

    • Create children

    • Delete children

    • Edit children

    • Modify underlying objects

    • Edit folder

    • Delete folder

    • Edit object

    • Delete object

When you assign permissions to an object, only the appropriate actions from above takes effect.

To enable advanced authorizations, you should run the CTC template Configure Advanced Authorizations in ESR . For more information, see Configuring Advanced Authorizations .

Authorization Checks

In the ES Builder, you can define authorizations for objects, folders, namespaces, and software component versions. The system checks for authorizations based on hierarchy. The system first checks authorizations for objects. If no authorizations are defined for the object, it then checks authorizations for folders, then namespaces, and software component versions. If no authorizations are defined, the default authorizations defined for the repository takes effect. If authorizations are not defined in the repository, then the authorization checks are performed based on user defined roles. For more information, see Defining User Roles .

More Information

Defining Authorizations