SLM Security Roles


To protect the SLM from unauthorized access, as well as to provide a way of tracking the changes made in the system landscape, three security roles are defined. The SLM security roles are based on the User Management Engine (UME) role concept. The security roles in the SLM are analogical to the security roles in the SLD.


SLM Security Roles, Actions and Permissions

SLM Security Role

SLD and SLM Actions

SLD and SLM Permissions



Read access to data in the SLD server and data in the local database


?     View system landscape data

?     View plan data (not allowed to create, confirm and delete plans)

?     View realized scenario data

?     View plan and realized scenario data in a graphical mode (not allowed to make changes to a model)

?     View solution data (not allowed to add and delete third-party solution data)



In addition, write access to data in the SLD server and data in the local database


In addition:

·        Create, confirm and delete plans

·        Make and save changes to a plan and realized scenario graphical model

?     Add, save and delete third-party solutions data



Includes all other roles


Includes all other roles


To create SLM security roles:


       1.      Create SLM users.

       2.      Create SLM roles and assign the corresponding SLD and SLM actions to the SLM roles.

The SLD and SLM actions are defined in the UME.

       3.      Assign the SLM users to the SLM roles.

For more information about managing security roles, see Managing Users, Groups, and Roles.

See also:

User Administration Console