Version 9.6
 —  Users, Groups, Roles and Permissions  —

About Roles and Permissions

In CentraSite, access control is enabled through a system of roles and permissions. A permission enables a user to perform a specified operation on a specified object. Permissions also enable users to work with specified parts of the CentraSite Control user interface. A role is a collection of permissions that can be assigned to an individual user or a group. The roles to which you belong and the permissions they includes dictate what portions of the CentraSite Control user interface you see, what objects you can work with, and what operations you can perform.

This section describes how you use permissions and roles to apply access control to the objects in your registry.


About Permissions

A permission enables a user to perform a specified operation on a specified object. Permissions also enable users to work with specified parts of the CentraSite Control user interface. It is largely CentraSite's system of permissions and roles that enables it to manage and maintain the separation of organizations in the registry.

Within CentraSite, there are two basic types of permissions: instance-level permissions and role-based permissions.

Instance-Level Permissions

An instance-level permission enables access to:

Instance-level permissions are granted at the following levels: View, Modify and Full.

The following table describes the capabilities that each level gives to a user. Note that each level of access inherits the capabilities of the preceding level. That is, each level implicitly includes the lower levels of access. In CentraSite's permission model, it is not possible to give a user delete permission without also giving that user modify permission. The Full permission, which enables a user to delete an object, implicitly gives the user Modify and View permissions as well.

Permission Levels on Registry Objects

This permission level... Enables a specified user or group to do the following...
View Read the object.
Modify Read and edit the object; view the object's instance-level permissions.
Full Read, edit and delete the object; modify the object's instance-level permissions.

Permission Levels on Repository Folders

This permission level... Enables a specified user or group to do the following...
View Read and browse the folder and its properties.
Modify Read and browse the folder and its properties; create files and subfolders in the folder; view the folder's instance-level permissions.
Full Read and browse the folder and its properties; create files and subfolders in the folder; delete files and subfolders in the folder; modify the folder's instance-level permissions.

Permission Levels on Repository Files

This permission level... Enables a specified user or group to do the following...
View Read the file and its properties.
Modify Read and edit the files and its properties; view the file's instance-level permissions.
Full Read and edit the file and its properties; modify the file's instance-level permissions.

Important:
Full permission on a repository file does not give a user the ability to delete the file. Permission to delete a file is given only to those who have Full permission on the folder in which the file resides.

On Which Objects Can You Assign Instance-Level Permissions?

You can assign instance-level permissions to the following types of registry and repository objects:

Implicit View Permissions on Registry Objects

CentraSite grants implicit View permission to all users on the following types of registry objects:

The View permission that CentraSite grants to users on these objects is permanent and irrevocable. It cannot be taken away from users through any instance-level or role-based permission.

Who Can Assign Instance-Level Permissions?

To assign instance level permissions to registry or repository objects, you must have Full permission on the object itself or belong to a role that includes a permissions that effectively grants you Full access to the object.

By default, a user has implicit (and irrevocable) Full permission on all of the objects that he or she owns. Consequently, the object owner is one user that is always permitted to set the instance-level permissions on an object.

How to Assign Instance-Level Permissions

For information about how to set instance-level permissions on registry and repository objects, see the following procedures in the CentraSite user documentation.

For procedures on... See this section...
Assets Setting Permissions on an Asset, in the document Using the Asset Catalog
Report templates Setting Permissions on a Report Template, in the document Working with Reports and Report Templates
Design/change-time policies Setting Permissions on a Design/Change-Time Policy, in the section Functional Scope in the document Working with Design/Change-Time Policies
Run-time policies Setting Permissions on a Run-Time Policy, in the document Working with Run-Time Policies
Taxonomies Setting Permissions on a Taxonomy, in the document Taxonomies

Role-Based Permissions

Role-based permissions enable access to an entire set of objects or give users the ability to perform certain operations in CentraSite. Unlike instance-level permissions, which are assigned directly to individual users or groups, role-based permissions are assigned to roles, and roles are assigned to users and groups. You cannot assign a role-based permission to a user or group directly.

There are two basic types of role-based permissions:

Some permissions are granted implicitly when you assign other permissions.

These topics are described in the following sections:

Permissions that Enable Access to Areas of the User Interface

Role-based permissions include a set of permissions that enable access to certain features and screen sets in the CentraSite Control user interface. These permissions determine which tabs a user sees in the navigation bar in CentraSite Control. For example, CentraSite will not display the navigation bar's Policies profile to a user unless the user has the "Use the Policy UI" permission. The UI-related permissions also include permissions that enable users to view certain logs and use certain controls in CentraSite Control.

graphics/scrn_NavigationBar.png

Note:
The user interface permissions apply only to the CentraSite Control user interface. They do not affect access to features or screen sets in the CentraSite plug-in for Eclipse.

By default, all CentraSite users have implicit (and irrevocable) permission to use the Asset Catalog area of the CentraSite Control user interface. To use the other parts of the user interface, a user must belong to a role that includes the appropriate user interface permission either explicitly (i.e., the role includes the permission itself) or implicitly (i.e., the role includes a permission that implicitly grants the UI permission). For more information about implicitly granted permissions, see Implication of Additional Permissions.

The following table describes the user interface permissions that are available in each CentraSite edition:

Available Permissions in CentraSite full-feature edition Available Permissions in Community Edition
Use the Home UI

check mark

Use the Policy UI  
Use the Administration UI

check mark

Use the Reports UI

check mark

Use the Operations UI  
View Policy Log  
View Approval History  
Register as Consumer

check mark

For a complete description of the user interface permissions, see The Role-Based Permissions in CentraSite.

For more information about CentraSite editions, see the section CentraSite Editions in the document Introducing CentraSite.

Permissions that Enable Access to Objects

Role-based permissions include a second type of permissions that enable users to create and/or work with an entire class of objects.

Generally speaking, these types of role-based permissions grant a specified level of access on objects of a specific type. For example, the "Modify Assets" permission grants Modify-level access on all objects of the type Asset. Role-based permissions enable you to apply access controls over an entire class of objects instead of assigning permissions on each object individually.

Levels of Access Granted by the Role-Based Permissions

If a role-based permission grants access to an object, the name of the permission includes one of the following terms to indicate which level of access the permission provides.

If the name includes the following term... The permission grants the following levels of access...
View Read objects of a specified type. This level is equivalent to giving a user View instance-level permission on all objects of a given type.
Modify Read and edit objects of a specified type. This level is equivalent to giving a user Modify instance-level permission on all objects of a given type.
Create Create and read objects of a specified type. This level is equivalent to giving a user View instance-level permission of all objects of a given type and giving them the ability to create new instances of that type.
Manage Create, read, edit, delete and modify the instance-level permission of objects of a specified type. This level is equivalent to giving a user Full instance-level permission of all objects of a given type.

Be aware that CentraSite does not provide role-based permissions at all levels for all object types. Access to certain objects types can only be granted at the Manage level, for example. For a complete list of the role-based permissions, see Predefined Roles in CentraSite.

System-Level vs. Organization-Level Permissions

Role-based permissions that enable access to objects are either organization-specific or system-wide.

System-Level Permissions

A system-wide permission grants access to objects that are available to all organizations, such as taxonomies and asset types. Additionally, some system-wide permissions grant access to all objects of given type in any organization in the registry/repository.

The following table describes the system-level permissions that are available in each CentraSite edition:

Available Permissions in CentraSite full-feature edition Available Permissions in Community Edition
Manage Organizations

check mark

Manage System-wide Lifecycle Models  
Manage System-wide Design/Change-Time Policies  
Manage System-wide Runtime Policies  
Manage Report Templates

check mark

Manage System-wide Roles

check mark

Manage UDDI Subscriptions

check mark

Create UDDI Subscriptions

check mark

View UDDI Subscriptions

check mark

Manage Federations  
Manage Taxonomies

check mark

Manage Asset Types  
Manage Runtime Targets  
Manage Runtime Event Types  
Manage Supporting Documents

check mark

View Supporting Documents

check mark

Organization-Level Permissions

An organization-specific permission grants a specific level of access to all objects of a given type within a specified organization. Permissions that enable access to assets, policies and lifecycle models are organization-specific.

The following table describes the user interface permissions that are available in each CentraSite edition:

Available Permissions in CentraSite full-feature edition Available Permissions in Community Edition
Manage Assets

check mark

Create Assets

check mark

Modify Assets

check mark

View Assets

check mark

Manage Design/Change-Time Policies  
Manage Run-Time Policies  
Manage Lifecycle Models  
Manage Users

check mark

Manage Organizations

check mark

For a complete description of the system-level and organization-level permissions, see The Role-Based Permissions in CentraSite.

For more information about CentraSite editions, see the section CentraSite Editions in the document Introducing CentraSite.

Implication of Additional Permissions

Most role-based permissions grant additional permissions by implication. That is, the permission grants not only the permission that its name indicates, it grants additional implied permissions.

For example, any permission that grant access to a particular type of object automatically includes (by implication) the UI permissions required to work with that object. Users that belong to roles that include the "Manage Taxonomy" permission, for instance, automatically receive the "Use the Administration UI" permission by implication.

The "Manage Organizations" permission is an example of another permission that grants additional permissions by implication. This permission, when given at the system-level, essentially implies all other role-based permissions. Consequently, a user with "Manage Organizations" permission at the system-level can manage virtually any object in any organization.

For a description of the individual permissions, and the permissions they each imply, see The Role-Based Permissions in CentraSite.

The Role-Based Permissions in CentraSite

The following table describes the individual permissions and their implied permissions in CentraSite, if any.

Permission Scope Purpose Implied Permissions
Use the Home UI System-wide Grants the right to use the Home area in CentraSite Control. Without this permission the UI will hide the Home top-level navigation item. None
Use the Policy UI System-wide Grants the right to use the Policy area in CentraSite Control. Without this permission the UI will hide the Policy top-level navigation item. None
Use the Administration UI System-wide Grants the right to use the Administration area in CentraSite Control. Without this permission the UI will hide the Administration top-level navigation item. None
Use the Reports UI System-wide Grants the right to use the Reports area in CentraSite Control. Without this permission the UI will hide the Reports top-level navigation item. None
Use the Operations UI System-wide Grants the right to use the Operations area in CentraSite Control. Without this permission, the UI will hide the Operations top-level navigation item. None
View Policy Log System-wide Grants the right to view the policy log. "Use the Administration UI"
View Approval History System-wide Grants the right to view the approval history. "Use the Administration UI"
Register as Consumer System-wide Grants the right to register as a consumer of assets. None
Manage Assets Organization Grants the right to manage assets and supporting documents within an organization. "Create Assets"
"Modify Assets"
"View Assets"
Create Assets Organization Grants the right to create new assets within an organization. None
Modify Assets Organization Grants the right to modify all assets and supporting documents within an organization.
The "Modify Assets" permission is important not just for applying updates to existing assets but also for performing consumer registrations.
"View Assets"
View Assets Organization Grants the right to view all assets and supporting documents within an organization. None
Manage Design/Change-Time Policies Organization Grants the right to manage design/change-time policies within an organization.
Additionally, this implies the right to manage all policy-related objects such as policy conditions and policy parameters.
Note that there is no explicit permission for viewing design/change-time policies, since design/change-time policies are visible for everyone.
"Use the Policy UI"
Manage Run-Time Policies Organization Grants the right to manage run-time policies within an organization.
Additionally, this implies the right to manage all policy-related objects such as policy conditions and policy parameters.
Note that there is no explicit permission for viewing run-time policies, since run-time policies are visible for everyone.
"Use the Policy UI"
Manage Lifecycle Models Organization Grants the right to manage lifecycle models (LCMs) within an organization.
Note that there is no explicit permission for viewing LCMs, since LCMs are visible for everyone.
"Use the Administration UI"
"Modify Assets"
"Manage Design/Change-Time Policies"
"Manage Runtime Policies"
Manage Users Organization Grants the right to manage users of an organization.
Additionally, this grants the right to manage groups and roles within an organization.
"Use the Administration UI"
Manage Organizations Organization Grants the right to manage an organization and all its child organizations.
Also grants the right to manage the organization folder in Supporting Document Library (SDL). By default, the content of an organization folder is visible for every user of that organization.
Note that all organizations are visible for everyone.
"Manage Users"
"Manage Design/Change-Time Polices"
"Manage Run-Time Policies"
"Manage Lifecycle Models"
"Manage Assets"
Manage Organizations System-wide Grants the right to manage all organizations in the CentraSite instance.
Note that all organizations are visible for everyone.
"Manage Organizations" (org-level permission for every organization)
"Manage System-wide Design/Change-Time Policies"
"Manage System-wide Run-Time Policies"
"Manage-System-wide Lifecycle Models"
"Manage Report Templates"
Manage System-wide Lifecycle Models System-wide Grants the right to manage lifecycle models.
Note that there is no explicit permission for viewing system-wide lifecycle models, since system-wide lifecycle models are visible for everyone.
"Use the Administration UI"
"Manage Lifecycle Models" (org-level permission for every organization)
"Manage System-wide Design/Change-Time Policies"
"Manage System-wide Runtime Policies"
Manage System-wide Design/Change-Time Policies System-wide Grants the right to manage design/change-time policies.
Additionally, this implies the right to manage the following policy-related objects:
• Action Categories
• Action Templates
• Action Parameters
Note that there is no explicit permission for viewing system-wide design/change-time policies, since system-wide design/change-time policies are visible for everyone.
"Use the Policy UI"
Manage System-wide Runtime Policies System-wide Grants the right to manage run-time policies.
Additionally, this implies the right to manage the following policy-related objects:
• Action Categories
• Action Templates
• Action Parameters
Note that there is no explicit permission for viewing system-wide run-time policies, since system-wide run-time policies are visible for everyone.
"Use the Policy UI"
Manage Report Templates System-wide Grants the right to manage system-wide report templates.
Note that there is no explicit permission for viewing system-wide report templates, since system-wide report templates are visible for everyone.
"Use the Reports UI"
Manage System-wide Roles System-wide Grants the right to manage system-level roles.
Note that there is no explicit permission for viewing system-wide roles, since system-wide roles are visible for everyone.
"Use the Administration UI"
Manage UDDI Subscriptions System-wide Grants the right to manage UDDI Subscriptions. "Create UDDI Subscriptions"
"View UDDI Subscriptions"
Create UDDI Subscriptions System-wide Grants the right to create new UDDI Subscriptions and view existing UDDI Subscriptions. "View UDDI Subscriptions"
View UDDI Subscriptions System-wide Grants the right to view UDDI Subscriptions. "Use the Administration UI"
Manage Federations System-wide Grants the right to manage federations.
Note that there is no explicit permission for viewing federations, since federations are visible for everyone.
"Use the Administration UI"
Manage Taxonomies System-wide Grants the right to manage taxonomies.
Note that there is no explicit permission for viewing system-wide taxonomies, since system-wide taxonomies are visible for everyone.
"Use the Administration UI"
Manage Asset Types System-wide Grants the right to manage asset types.
Note that there is no explicit permission for viewing asset types, since asset types are visible for everyone.
"Use the Administration UI"
Manage Runtime Targets System-wide Grants the right to manage run-time targets and target types.
Note that there is no explicit permission for viewing run-time targets and target types, since run-time targets and target types are visible for everyone.
"Use the Operations UI"
Manage Runtime Event Types System-wide Grants the right to mange run-time event types.
Note that there is no explicit permission for viewing run-time event types, since run-time event types are visible for everyone.
"Use the Operations UI"
Manage Supporting Documents System-wide Grants the right to manage the content of all folders in the Supporting Documents Library (SDL). "View Supporting Documents"
View Supporting Documents System-wide Grants the right to view the content of all folders in the Supporting Documents Library (SDL). None

Combining Role-Based and Instance-Level Permissions

When a user receives multiple permissions for the same object, the permissions are combined and the user receives the union of all the permissions.

For example, if you give a user instance-level View permission on an asset and that user belongs to a role that gives him or her Modify permission on the asset, that user will get View permission plus Modify permission on the asset (or, in effect, Modify permission since it implies View permission).

You will need to keep this concept in mind when granting role-based access to a large group of users (particularly to an entire organization). Anytime you use a role-based permission to give a group of users access to the entire set of assets in an organization, you can no longer use instance-level permissions to reduce the level of access for those users. For example, when everyone in your organization is given "View Assets" permission, you no longer have a way to use instance-level permission to selectively hide assets from certain users in the organization. In effect, the View permission becomes irrevocable for the users in the organization.

Top of page

About Roles

A role is a collection of role-based permissions. Assigning a role to a user gives the user the permissions specified in the role. Roles can be assigned to individual users or to groups.

CentraSite provides many predefined roles for you to use. You can also create custom roles as needed.

Predefined Roles in CentraSite

CentraSite provides many predefined roles. These roles fall into two categories:

For detailed information about these roles, see Organization-Level Roles.

The following table summarizes the permissions that CentraSite assigns to each of the predefined roles by default. Be aware that the permission assignments for most of these roles can be customized by an administrator. If an administrator has customized a predefined role at your site, it might have different permissions than what is shown here.

Permission Type Scope System-Level Roles Organization-Level Roles
CSA ATA OPA Guest OA PA AA AP AC
Use the Home UI UI System-wide

check mark

check mark

check mark

 

check mark

check mark

check mark

check mark

check mark

Use the Policy UI UI System-wide

check mark

 

check mark

 

check mark

check mark

     
Use the Administration UI UI System-wide

check mark

check mark

   

check mark

       
Use the Reports UI UI System-wide

check mark

 

check mark

 

check mark

 

check mark

check mark

check mark

Use the Operations UI UI System-wide

check mark

 

check mark

           
View Policy Log UI System-wide

check mark

check mark

check mark

 

check mark

check mark

check mark

   
View Approval History UI System-wide

check mark

check mark

check mark

 

check mark

check mark

check mark

   
Register as Consumer UI System-wide

check mark

     

check mark

 

check mark

check mark

check mark

Manage Assets ORG Organization        

check mark

 

check mark

   
Create Assets ORG Organization        

check mark

 

check mark

check mark

 
Modify Assets ORG Organization        

check mark

 

check mark

   
View Assets ORG Organization        

check mark

check mark

check mark

check mark

check mark

Manage Design/Change-Time Policies ORG Organization        

check mark

check mark

     
Manage Run-Time Policies ORG Organization        

check mark

check mark

     
Manage Lifecycle Models ORG Organization        

check mark

 

check mark

   
Manage Users ORG Organization        

check mark

       
Manage Organizations ORG Organization        

check mark

       
Manage Organizations SYS System-wide

check mark

               
Manage System-wide Lifecycle Models SYS System-wide

check mark

check mark

check mark

           
Manage System-wide Design/Change-Time Policies SYS System-wide

check mark

check mark

check mark

           
Manage System-wide Runtime Policies SYS System-wide

check mark

 

check mark

           
Manage Report Templates SYS System-wide

check mark

 

check mark

           
Manage System-wide Roles SYS System-wide

check mark

               
Manage UDDI Subscriptions SYS System-wide

check mark

 

check mark

           
Create UDDI Subscriptions SYS System-wide

check mark

 

check mark

           
View UDDI Subscriptions SYS System-wide

check mark

 

check mark

           
Manage Federations SYS System-wide

check mark

               
Manage Taxonomies SYS System-wide

check mark

check mark

             
Manage Asset Types SYS System-wide

check mark

check mark

             
Manage Runtime Targets SYS System-wide

check mark

 

check mark

           
Manage Runtime Event Types SYS System-wide

check mark

 

check mark

           
Manage Supporting Documents SYS System-wide

check mark

               
View Supporting Documents SYS System-wide

check mark

               

System-Level Roles

The following predefined roles in CentraSite are system-level roles. Generally speaking, these roles contain permissions that enable users to work with system-wide objects. Some of these roles also enable users to manage (view, edit or delete) all instances of a given object type in any organization in the CentraSite registry/repository. For example, a user in the Centrasite Administrator role has, in effect, Full permission on every asset in every organization.

The main characteristic that distinguishes a system-level role from an organization-level role is that a system-level role is not generated for each new organization.

As noted in the following descriptions, some system-level roles can be edited and/or deleted and others cannot.

For a summary of the permissions that CentraSite assigns to these predefined roles by default, see Predefined Roles in CentraSite.

Organization-Level Roles

CentraSite automatically populates any new organization that is created with the following organization-level roles and permissions.

Note:
By default, the Asset Provider and Asset Consumer roles are automatically assigned to the Users group that CentraSite creates for an organization. Consequently, every user in an organization is assigned these roles. If you do not want every user in your organization to have these roles (for example, if you do not want every user to have the Asset Provider role), edit the role assignments for your organization's Users group. For procedures, see Assigning Roles to a Group.

For a summary of the permissions that CentraSite assigns to these predefined roles by default, see Predefined Roles in CentraSite.

Creating and Managing Roles

You can create custom roles in CentraSite as needed. Custom roles can contain system-level permissions and/or organization-level permissions. A custom role can contain organization-level permissions for multiple organizations (i.e., you can create a role that allows a user to manage the policies in two different organizations). You can also modify many of the predefined organizations that CentraSite installs. For information about which predefined roles can be modified, see the topics System-Level Roles and Organization-Level Roles in the section About Roles and Permissions in the document Users, Groups, Roles and Permissions.

Who Can Create and Manage Roles?

To create and manage (i.e., view, edit and delete) roles for an organization, you must belong to a role that has the "Manage Users" permission for the organization. Users in the Organization Administrator role have this permission, although an administrator can assign this permission to other roles.

Note:
Users that belong to a role that includes the "Manage Organizations" permission have the "Manage User" permission by implication. Such users can create and mange groups in any organization to which their "Manage Organizations" permission applies.

Be aware that you when you define a role, you cannot assign permissions to the role that you do not have yourself. Therefore, if you belong to the Organization Administrator role (and you have no additional role assignments), you cannot create roles that have any additional permissions than the ones provided by the Organization Administrator role. For example, you could not create a role that included system-level permission or permissions for other organizations. A user with the "Manage Organizations" permission at the system-level (such as someone in the CentraSite Administrator role) would need to do that.

Creating Custom Roles

Start of instruction setTo create a custom role

  1. In CentraSite Control, go to Administration > Users > Roles.

  2. On the Roles page, click Add Role.

  3. In the Role Information panel, specify the following fields:

    In this field... Do the following...
    Name

    Enter a name for the new role. A role name can contain any character (including spaces).

    Note:
    The role name must be unique within an organization.

    Description

    Optional. Enter a short description for the new role. This description appears when the user displays the list of roles in CentraSite Control.

    Organization Specify the organization to which this role belongs. (The drop-down list only displays organizations for which you have "Manage Users" permission.)
  4. In the Permissions panel, click Assign permissions.

  5. In the Assign Permissions dialog box, do the following

    1. Select the permission(s) that you want to assign to this role. (The list will only contain permissions that you are authorized to assign.)

    2. Click OK.

  6. Click Save to create the new custom role in the CentraSite registry/repository.

Viewing and Editing Roles

You use the Edit Role page to examine and/or edit the properties of a role. When viewing or editing a role, keep the following points in mind:

Start of instruction setTo view or edit the properties of a role

  1. In CentraSite Control, go to Administration > Users > Roles.

  2. By default, all of the available roles are displayed.

    If you want to filter the list to see just a subset of the available roles, type a partial string in the Search field. CentraSite applies the filter to the Name column. The Search field is a type-ahead field, so as soon as you enter any characters, the display will be updated to show only those roles whose name contains the specified characters. The wildcard character "%" is supported.

  3. Locate the role that you want to view or edit.

  4. From the role's context menu, select the Details command.

  5. Examine or modify the attributes on the Edit Role page as necessary.

    Field Description
    Name

    The name of the role. A role name can contain any character (including spaces).

    Note:
    The role name must be unique within an organization.

    Description Additional comments or descriptive information about the role.
    Organization

    Read-only. The organization to which the role belongs.

    Permissions The settings on this profile identify the permissions that are assigned to this role.
  6. If you want to add or remove permissions to/from the role, select the Permissions profile and do the following:

    1. To add permissions to the role, click Assign Permissions and select the permission that you want to add.

    2. To remove permissions from the role, select the permissions that you want to remove and click Remove.

  7. If you have edited the settings on the Edit Role page, click Save to save the updated role.

Deleting Roles

You use the Roles page to delete the custom roles. When deleting a role, keep in mind that you cannot delete the CentraSite Administrator role or the Organization Administrator role (not even if you belong to the CentraSite Administrator role).

Start of instruction setTo delete a role

  1. In the CentraSite Control, go to Administration > Users > Roles to display the roles list.

  2. Enable the checkbox next to the name of the role that you want to delete.

  3. Click Delete.

    When you are prompted to confirm the delete operation, click OK.

You can delete multiple roles in a single step. The rules described above for deleting a single role apply also when deleting multiple roles.

Important:
If you have selected several roles where one or more of them are predefined roles, you can use the Delete button to delete the roles. However, as you are not allowed to delete predefined roles, only roles you have permission for will be deleted. The same applies to any other roles for which you do not have the required permission.

Start of instruction setTo delete multiple roles in a single operation

  1. In CentraSite Control, go to Administration > Users > Roles to display the roles list.

  2. Mark the checkboxes of the roles that you want to delete.

  3. From the Actions menu, choose Delete.

    When you are prompted to confirm the delete operation, click OK.

Top of page