Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Work Tasks

Introduction to Security Framework

  • Last UpdatedSep 11, 2024
  • 1 minute read

AVEVA Work Tasks introduced the security framework to secure the repository in various ways.

Security framework uses security group, security rights, and security group resource mapping to control the access to features in the repository.

  • Security rights: CanCreateItem, CanDeleteItem, and CanDesignWorkflow etc.

  • Security groups: Administrator, Contributor, Reader, and Limited Access.

  • Security Group Resource Mapping: Security Group Resource Mapping is mapping users or roles to security groups.

Roles can be mapped to Security Groups along with the Priority. Users can also be explicitly mapped to Security Groups.

On logging in to the repository, the user will have the privileges given to the security group to which they belong.

Example:

If the user logs in and belongs to the administrator security group, they will have all the privileges of the administrator security group.

TitleResults for “How to create a CRG?”Also Available in