Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Work Tasks

Choose between Mapping and Customization

  • Last UpdatedJul 25, 2023
  • 1 minute read

You can choose both or any one of the following options to apply the security settings:

Resource Mapping

Choose this option if you want to privilege or restrict the user(s) at one level, and want to retain the definition at other levels.

For example, the user 'John' is a Contributor access rights user at the Repository level. You want him to provide him Reader rights at the Workflow list level but want retain the security defined at the repository level. To do this, choose Resource Mapping while enabling security at the Workflow list level, select this user and map him to the Reader security group.

Once Resource Mapping is enabled at the list level, the user should be able to identify that mapping is enabled at the list level.

Security Group Customization

Choose this option if you want to modify or customize the definition of a security group.

For example, you want all reader (Reader access rights) users who do not have rights at the repository level to create and edit items in any list. You want all reader users to have rights at the Workflow list level to create and edit an item, you should choose Security Group Customization and modify the reader security group definition so that all reader users can add and edit an item.

Once Security Group Customization is enabled at the list level, the user should be able to identify that customization is enabled at the list level.

In This Topic
TitleResults for “How to create a CRG?”Also Available in