Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Work Tasks

Replace User in Security Resource Mapping

  • Last UpdatedNov 24, 2023
  • 2 minute read

The Replacing User in Security Resource Mapping option in the Lists Artifacts helps you replace the user mapped to a security group at List and List item level with an Alternate User.

  • Viewing the report and replacing the security group resource mapping of Lists where User to be Replaced Rick is mapped and alternate user John is not mapped. From this option you can access the Security Group - Resource Mapping Report dialog, wherein you can select a list and view the security group mapping of the User to be Replaced for the selected list and/or list item level.

    • Select the check box beside each of items, click Replace. The selected Alternate User will be mapped to the User to be replaced Security Group for the selected list or list item level.

    • If the check box at the header level is selected, all the items will be selected.

  • Viewing the report and replacing the security group resource mapping of Lists where both User to be Replaced Rick and alternate user John are mapped. From this option you can access the Security Group - Resource Mapping Report dialog, wherein you can select a list and view the security group mapping where both the User to be Replaced and Alternate User are mapped to the same list or list item level.

    • Select the check box beside each of items, click Replace. The selected Alternate User will be mapped to the User to be Replaced Security Group for the selected list or list item level.

Scenario 1

If both the users are mapped to the same security group

Consider Rick (User to be Repalced) and John (Alternate User) are mapped to the security group Contributor.

  • The security group mapping of Rick (User to be replaced) done for the selected list/list item level will be removed.

  • The security group mapping of John (Alternate User) will be retained for the selected list or list item level.

Scenario 2

If the User to be Replaced and Alternate User are mapped to different security groups

Consider Rick (User to be Replaced) is mapped to security group Administrator and John (Alternate User) is mapped to the security group Contributor.

  • The security group mapping of Rick (User to be replaced) done for the selected list/list item level will be removed.

  • The security group mapping of John (Alternate User) will be changed to Administrator for the selected list or list item level.

Consider Rick (User to be Replaced) is mapped to security group Reader and John (Alternate User) is mapped to the security group Administrator.

  • The security group mapping of Rick (User to be replaced) done for the selected list/list item level will be removed.

  • The security group mapping of John (Alternate User) will be changed to Reader (security group of User to be Replaced) for the selected list or list item level.

    Note: This dialog is displayed to ensure the user can view that the User to be Replaced and Alternate User belong to different security groups. As we have no defined hierarchy among security groups the administrator needs to take the required action to ensure the Alternate User gets all the required privileges.

Related Links
TitleResults for “How to create a CRG?”Also Available in