> > > Access Control - Role Permissions

Access Control - Role Permissions

12th June 2016

Sean Hoppe Consulting Group

In our previous guides, we’ve reviewed how to configure a new account and how to create a new role using Access Control. When creating a new role, there were many permissions that you can add to a role.  Some of those permissions may not be very self-explanatory and users may not entirely know what each permission means.  

Access Control Permissions in Cleo Clarify EBI Studio

In this guide, we’ll list each role and give a brief definition of each, and how they can work under your role.

Add/Delete SSH Key – This permission allows the user to add or delete SSH keys from within the Settings view.

Add/Modify/Delete Users, Role and LDAP Profiles – This permission is only assigned to the Admin role, which is the default role to the ebiadmin User.  However, this permission can be added to any role, and custom roles.  This permission allows administrative control for the Access Control feature.

Add/Remove Exit Point Event – This permission allows the user add or remove Exit Point Events.  As there is no option to suspend an Exit Point, removing the Event to the Exit Point is the only way to stop it from processing.

Apply License – This permission allows the user to view, request, and apply a license to the Server environment.

Apply Selected Server Updates – This permission allows the user to apply updates to the Server environment.

Change Log Status, Change Ack Status, Delete Log Entries – This permission allows access to the toolbar above the Log Entries in the Auditor.  It allows the ability to change the log status, change acknowledgement status for outbound EDI (interchange level only), and delete logs at any level.

Deploy/Undeploy Projects – This permission allows the user to deploy and undeploy Projects from this server environment.

Edit Inbound Connection Log Data – This permission enables the user to edit Inbound EDI data in the Log of Connection.

Import/Export/Delete SSL Cert/Key – This permission allows the user to manage cryptographic keys and certificates from the Keystore Manager for use with SFTP Adapters.

Launch BP/Relaunch Last BP/Add Startup BP/Enable-Disable Startup BP/Remove Startup BP – This permission enables the user to modify Business Process settings and configuration in the Business Process and Settings view.  From here, you can configure your Startup Business Process, and use additional Business Process functions, such as Relaunch Last Business Process.

Modify Control Numbers – This permission allows the user to modify Control Number values from the Settings view.

Modify Email Settings – This permission allows the user to modify email settings from the Settings view.

Modify Global Variables – This permission allows the user to modify Global Variable values from the Settings view.

Modify Next Numbers – This permission allows the user to modify Next Number values from the Settings view.

Modify Queue Settings – This permission allows the user to edit, suspend, and resume queues in a Server Cluster.  It also allows the user to suspend and resume Workers within the Worker Nodes in the Activity Monitor view.

Reprocess Logs – This permission allows the user to reprocess data from the Log Entries section within the Auditor.  To reprocess, select the log and choose the Reprocess log button from within the toolbar.  Remember that inbound and outbound EDI documents can only be reprocessed from the Log of Connection, Log of Interchange, and Log of Message.

Start/Stop Monitors and Web Service Providers – This permission allows the user to start and stop Resource Monitors, such as File, Database, and Email Monitors, from the Resource Monitors view.  It also allows the user to start and stop Web Service Providers from processing.

Suspend/Resume Server – This permission allows the user to suspend and resume the server.

View Dashboard Services – This permission allows the user to use EXTOL Dashboard for this server environment.

View Log Data – This permission allows the user to view the source and target data from within the Auditor.


By: on