Integration Server 10.11 | Integration Server Administrator's Guide | Controlling Access to Resources | Controlling Access to Resources with ACLs | Allowing or Denying Group Access to ACLs
 
Allowing or Denying Group Access to ACLs
You can edit a new or predefined ACL to allow certain groups to access this ACL and deny permissions to other groups. You can allow and deny access to internally defined groups as well as groups and roles defined externally in a central user directory or in LDAP.
*To allow group access to an ACL
1. Open Integration Server Administrator if it is not already open.
2. Go to Security > ACLs. The server displays the Access Control Lists page.
*Groups in the Allowed list are explicitly allowed to access the packages, folders, services, or other elements associated with this ACL.
*Groups in the Denied list are explicitly denied access to the packages, folders, services, or other elements associated with this ACL.
3. In the Select ACL list under ACL Membership, select the ACL to which you want to add groups.
4. Do one of the following:
*If you want to allow a group or role access to this ACL, under the Allowed list, click Add.
*If you want to deny a group or role access to this ACL, under the Denied list, click Add.
5. In the dialog box that appears, in the Provider list, select the location from which you want to select a user group.
If an external user directory is not configured, the Provider list does not appear.
6. In the Role/Group Name list, do one of the following:
*If you select Local, select the locally defined user group for which you want to allow or deny access to the ACL.
*If you select Central or LDAP, in the Search field, enter search criteria for finding a role or group. Click Go. Select the role or group for which you want to allow or deny access to the ACL.
Note:
The value of the Search field takes precedence over the value of the watt.server.ldap.groupSearchFilter server configuration parameter. If you do not specify a value for the Search field, the value of the watt.server.ldap.groupSearchFilter parameter is used.
7. Click Save Changes.