Monitor 10.5 | Configuring Monitor | Granting Users Access to Monitor | Identifying the Audit Data on Which Users Can Perform Actions | Identifying Processes, Services, and/or Documents on Which a Role Can Act
 
Identifying Processes, Services, and/or Documents on Which a Role Can Act
The following table lists the pages that users with access privileges can view when data-level security is disabled.
Pages that display data for
User can view
Services
Audit data for all services.
Documents
All logged documents.
Process instances
Audit data for all process instances.
When you enable data-level security, by default, roles are blocked from accessing information about any processes, services, or documents. After you enable data-level security, you must configure data-level security for specific roles to identify the processes, services, and/or documents that each role can view and act on. After you have configured data-level security for roles, if a user belongs to multiple roles, that user will be able to work with all of the processes, services, and documents identified in all the roles to which the user belongs.
*To identify the data on which a user role can act
1. In My webMethods, click Navigate > Applications > Administration > System-Wide > User Management > Roles.
2. Search for the role for which you want to configure data-level security, and edit it. For more detailed instructions, see Administering My webMethods Server.
3. To configure data-level security for processes:
a. On the Edit Role page, click the Data Level Security tab, and then click the Business Process link. My webMethods displays the list of all processes the role can currently access. The list is empty if no processes have been added yet.
b. To add processes you want to allow this role to access, click Add Processes, use the Add Processes page to identify the processes you want to allow this role to access, and click OK.
c. Click Apply on the Edit Role page.
4. To configure data-level security for services, repeat step 3 but click the Service link.
5. To configure data-level security for documents, repeat step 3 but click the Document link.