webMethods Dynamic Business Orchestrator 10.1 | Configuring Dynamic Business Orchestrator | Controlling Access to Monitor Resources | Identifying the Audit Data on Which Users Can Perform Actions | Identifying Processes, Services, and/or Documents on Which a Role Can Act
 
Identifying Processes, Services, and/or Documents on Which a Role Can Act
When data-level security is disabled, the users with access privileges can view the pages listed in the table as follows:
Pages that display data for...
User can view...
Services
Audit data for all services.
Documents
All logged documents.
Process instances
Audit data for all process instances.
When you enable data-level security, by default, roles are blocked from accessing information about any processes, services, or documents. After you enable data-level security, you must configure data-level security for specific roles to identify the processes, services, and/or documents that each role can view and act on. After you have configured data-level security for roles, if a user belongs to multiple roles, that user will be able to work with all of the processes, services, and documents identified in all the roles to which the user belongs.
* To identify the data on which a user role can act
1. In My webMethods, click Navigate > Applications > Administration > System-Wide > User Management > Roles.
2. Search for the role for which you want to configure data-level security, and edit the role details. For more detailed instructions, see Administering My webMethods Server.
3. To configure data-level security for processes:
a. On the Edit Role page, click the Data Level Security tab, and then click the Business Process link. My webMethods displays the list of all processes the role can currently access. The list is empty if no processes have been added yet.
b. To allow a role to access processes, click Add Processes. On the Add Processes page, select the processes you want to allow this role to access, and click OK.
c. Click Apply.
4. To configure data-level security for services, repeat step 3 but click the Service link.
5. To configure data-level security for documents, repeat step 3 but click the Document link.

Copyright © 2018 | Software AG, Darmstadt, Germany and/or Software AG USA, Inc., Reston, VA, USA, and/or its subsidiaries and/or its affiliates and/or their licensors.