SLM Security Roles

Use

To protect the SLM from unauthorized access, as well as to provide a way of tracking the changes made in the system landscape, three security roles are defined. The SLM security roles are based on the User Management Engine (UME) role concept. The security roles in the SLM are analogical to the security roles in the SLD.

Features

SLM Security Roles, Actions and Permissions

SLM Security Role

SLD and SLM Actions

SLD and SLM Permissions

SlmViewer

LcrUser

Read access to data in the SLD server and data in the local database

tc~slm~permissions.View

?     View system landscape data

?     View plan data (not allowed to create, confirm and delete plans)

?     View realized scenario data

?     View plan and realized scenario data in a graphical mode (not allowed to make changes to a model)

?     View solution data (not allowed to add and delete third-party solution data)

SlmCreator

LcrInstanceWriterAll

In addition, write access to data in the SLD server and data in the local database

tc~slm~permissions.Create

In addition:

·        Create, confirm and delete plans

·        Make and save changes to a plan and realized scenario graphical model

?     Add, save and delete third-party solutions data

SlmAdministrator

LcrAdministrator

Includes all other roles

tc~slm~permissions.Configure

Includes all other roles

Activities

To create SLM security roles:

...

       1.      Create SLM users.

       2.      Create SLM roles and assign the corresponding SLD and SLM actions to the SLM roles.

The SLD and SLM actions are defined in the UME.

       3.      Assign the SLM users to the SLM roles.

For more information about managing security roles, see Managing Users, Groups, and Roles.

See also:

User Administration Console