Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Work Tasks

Enable Security at List Level

  • Last UpdatedJul 25, 2023
  • 1 minute read

You can enable list level security in the following ways:

  • By enabling Resource Mapping

  • By customizing the Security Group definitions

What happens when List level or List Item level mapping is enabled?

The resource mapping available at its parent level is nothing but Repository level copied to the list level. Once the resource mapping is copied to the list level, the user can add, modify, and delete the mapping.

Note: Before mapping is enabled, the changes done at the Repository or Dictator level will not effect the list level mapping. For example, assume that there are 10 user mapping at the repository level. After enabling mapping at the list level, all 10 users will be copied to the list level. If you add a one extra user mapping at the repository level, the newly added mapping at the repository level will not be available at the List level.

 

TitleResults for “How to create a CRG?”Also Available in