Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Work Tasks

Set Security of Lists

  • Last UpdatedJun 25, 2024
  • 2 minute read

Secure lists by defining rights assigned to a list or a set lists grouped under a folder.

A lists user or role inherits the rights assigned at a repository level. However, the administrator can customize the rights at a list level and also assign rights to groups and map users to groups.

Standard Settings

Use standard settings to view security set at the list level, if available, or at the repository level for:

  • a role or user.

  • the security group customization and resource mapping.

To view security set for a role or user

  1. In the Enterprise Console, click the Menu button, click Tools, and then click Manage List. The Manage List page appears.

  2. On the action bar, click Security. The Security Settings page appears.

  3. In the Standard settings tab, click View Effective Security For User/Role.

  4. Do one of the following:

Task

Action

  • View security set at the list level, if available, or at the repository level for a role.

  1. In the Role Based tab, click the Role Lookup button. The Role Lookup dialog box appears.

  2. Select a role, and then click Update.

  3. Click View Rights. The effective rights  for the role appears.

    • View security set at the list level, if available, or at the repository level for a user.

    1. Click the User Based tab.

    2. Click the User Lookup button. The User Lookup dialog box appears.

    3. Select a user, and then click Update.

    4. Click View Rights. The effective rights  for the user appears.

      To view security group customization and resource mapping

      1. In the Enterprise Console, click the Menu button, click Tools, and then click Manage List. The Manage List page appears.

      2. On the action bar, click Security. The Security Settings page appears.

      3. In the Standard settings tab, click View Security Mapping at List Level.

      4. Click on a Security Group. The Viewing Security Group Rights dialog box appears.

      5. Check the security group customization and resource mapping.

      6. Click Close (or click the Close button). The Viewing Security Group Rights dialog box is closed.

        Advanced Settings

        Use advanced settings to edit the existing mapping, add a new resource mapping or delete the existing mapping by enabling mapping at List level.

        To set or edit the security group customization and resource mapping

        1. In the Enterprise Console, click the Menu button, click Tools, and then click Manage List. The Manage List page appears.

        2. On the action bar, click Security. The Security Settings page appears.

        3. Click the Advanced settings tab, and then do one or more of the following:

          Task

          Action

          • Set the security group customization and resource mapping.

          • Click Enable List Specific Security.

          Note: This option is available only when the security group customization and resource mapping has not been set or removed.

          • Remove the security group customization and resource mapping.

          • Click Remove Security from this List.

          • Edit the security group customization.

          • Click Customize Security Group for this List.

          Note: You can also set the security right to manage data in custom lists by enabling or disabling the Can Manage Data option.

          • Edit the resource mapping.

          • Click Security Group - Resource Mapping for this List.

        In This Topic
        Related Links
        TitleResults for “How to create a CRG?”Also Available in