Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Work Tasks

Effect on Resource Rights after Deleting the Mapping

Effect on Resource Rights after Deleting the Mapping

  • Last UpdatedJul 25, 2023
  • 2 minute read

The example in this section explains the effect on resource rights after deleting the resource mapping at the item level.

Consider a Workflow listitem. A user belongs to the Contributor security group at the repository level, and to the Limited Access security group at the ListItem level. This example shows the resource rights, if the user deletes the mapping done at the listitem level.

Assume that there are four users in a repository with the following resource mapping at the repository level:

Users

Security Group Mapping

John

Administrator

Kevin

Contributor

Bob

Reader

Mac

Limited Access

Here John, Kevin, and Bob are mapped to the Administrator, Contributor, and Reader security groups respectively.

  1. Log on as the Administrator user to map the Contributor user 'Kevin' to the Limited Access security group at the workflow listitem level.

  2. Go to Workflows.

  3. Right-click a workflow, for example, 'Sale Workflow', and the select Security Settings from the context menu.

  4. Click View Effective Security for User/Role.

  5. Select the User Based tab, and search for the user 'Kevin' to view mapping at the listitem level.

  6. Before security is enabled at the listitem level, 'Kevin' has Contributor rights at the 'Sale Workflow' item level.

  7. Click Security Snapshots to view the mapping details at the repository level.

  8. Go to Advanced Settings tab, and click Enable ListItem Specific Security to enable the security at the List level.

  9. Check Resource Mapping  to change the mapping of the user 'Kevin', and then click Next.

  10. Click Next.

  11. Select 'Kevin', and click Edit from the ribbon bar, or right-click the user and select Edit from the context menu.

  12. The Mapping : User to a Security Group appears.

  13. Map the user 'Kevin' to the Limited Access security group at the list level.

  14. Click Save. The resource mapping saved successfully message appears.

  15. Click OK. You will be redirected to the Security Group Mapping page.

  16. Now the user 'Kevin' has Limited Access rights at the Workflow listitem level.

  17. After changing the security settings, check the behavior of this user.

  18. Click View Effective Security for User/Role.

  19. Select the User Based tab and search for 'Kevin' to view the mapping at the listitem level.

  20. After enabling security at the listitem level, the user 'Kevin' has Limited Access rights at the 'Sale Workflow' item level.

  21. Click Security Snapshots to view mapping details.

  22. Now, remove the mapping at this list item level. To do this, click Advanced Settings tab, and then click Remove Security from this ListItem.

  23. Select Resource Mapping, and click Next to remove mapping at this level.

  24. Click Next.

  25. Click View Effective Security for User/Role to view after deleting mapping at the 'Sale Workflow' item level.

  26. Select the User Based tab and search for 'Kevin' to view the mapping at the listitem level.

  27. After removing security at the listitem level, the user 'Kevin' has Contributor rights at the 'Sale Workflow' item .

  28. Click Security Snapshots to view mapping details.

TitleResults for “How to create a CRG?”Also Available in