Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Work Tasks

Set Security of Forms

  • Last UpdatedJun 24, 2024
  • 2 minute read

Secure a form by defining rights assigned to a form or a set of forms grouped under a folder.

A forms user or role inherits the rights assigned at a repository level. However, the administrator can customize the rights at a form level and also assign rights to groups and map users to groups.

Standard Settings

Use standard settings to view security set at the list level, if available, or at the repository level for:

  • a role or user.

  • the security group customization and resource mapping.

To view security set for a role or user

  1. In the Enterprise Console, click the Menu button, and then click Forms. The Forms page appears.

  2. On the action bar, click Security. The Security Settings  page appears.

  3. In the Standard Settings tab, click View Effective Security For User/Role.

  4. Do one of the following:

    Task

    Action

    • View security set at the list level, if available, or at the repository level for a role.

    1. In the Role Based tab, click the Role Lookup button. The Role Lookup dialog box appears.

    2. Select a role, and then click Update.

    3. Click View Rights. The effective rights for the role appear.

      • View security set at the list level, if available, or at the repository level for a user.

      1. Click the User Based tab.

      2. Click the User Lookup button. The User Lookup dialog box appears.

      3. Select a user, and then click Update.

      4. Click View Rights. The effective rights for the user appear.

      To view security group customization and resource mapping

      1. In the Enterprise Console, click the Menu button, and then click Forms. The Forms page appears.

      2. Click Security. The Security Settings page appears.

      3. In the Standard Settings tab, click View Security Mapping at List Level.

      4. Click on a Security Group. The Viewing Security Group Rights dialog box appears.

      5. Check the security group customization and resource mapping.

      6. Click Close (or click the Close button). The Viewing Security Group Rights dialog box is closed.

        Advanced Settings

        Use advanced settings to edit the existing mapping, add a new resource mapping or delete the existing mapping by enabling mapping at List level.

        To set or edit the security group customization and resource mapping

        1. In the Enterprise Console, click the Menu button, and then click Forms. The Forms page appears.

        2. Click Security, in the Security group. The Security Settings page appears.

        3. Click the Advanced settings tab, and then do one or more of the following:

          Task

          Action

          • Set the security group customization and resource mapping.

          • Click Enable List Specific Security.

          Note: This option is available only when the security group customization and resource mapping has not been set or removed.

          • Remove the security group customization and resource mapping.

          • Click Remove Security from this List.

          • Edit the security group customization.

          • Click Customize Security Group for this List.

          • Edit the resource mapping.

          • Click Security Group - Resource Mapping for this List.

        Follow the steps for the required task from Workflow Management Security Framework in the Workflow Management User Guide.

        In This Topic
        TitleResults for “How to create a CRG?”Also Available in