Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Work Tasks

Repository Level Security Group Resource Mapping

  • Last UpdatedMar 12, 2021
  • 1 minute read

Repository Level Security Group Resource Mapping allows you to replace the user who is mapped to a security group other than the administrator with an alternate actor.

Functionality

  • If the User to be Replaced is mapped to a security group other than the administrator (for example: mapped to security group contributor or reader), a message User is not part of this artifact is displayed.

  • If the User to be Replaced has higher security rights than the Alternate User, then the security rights of Alternate User will be updated and the security rights of the User to be Replaced will be applicable to the Alternate User.

  • If the Alternate User has higher security rights than the User to be Replaced , then the security rights of Alternate User will be updated and the security rights of the User to be Replaced will be applicable to the Alternate User. In this scenario the Alternate User's security rights will now be lower. For example: If the Alternate User (Royan) is an administrator and the User to be Replaced (Lee) is a contributor, then the Alternate Users's (Royan) security right will be updated as contributor.

    Note: A report to view the security group resource mapping done for the User to Replaced is not available for this artifact like Replacing User in Security Resource Mapping.

 

TitleResults for “How to create a CRG?”Also Available in