Object Security Permissions
All ActiveBatch objects are fully securable. This includes permissions such as who is allowed to connect to the Job Scheduler and create and manage objects and instances.
The access security for each object is described below. This includes the permissions you will see on each object's Security property sheet, and what they mean. The Factory Default security is also described so you know what security will be assigned to each new object type if factory default security is used.
To access the security of any object, right-click on the object in the Object Navigation pane, then select Properties > Security.

The Job Scheduler (root level) governs overall accessibility for a Job Scheduler machine. This is of particular importance since this object is used to indicate if a user is an ActiveBatch Administrator. ActiveBatch Administrator status is important to the product. An ActiveBatch Administrator can modify policies, create queues and, by default, access all ActiveBatch objects. While some customers will elect to have the Windows Administrators group manage their ActiveBatch systems, the product is flexible to allow further delegation.
Factory Default Job Scheduler security: The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Connect and Create Objects access.
Below you will find the security permissions applicable to the Job Scheduler object. It is what you initially see when you access the Security property sheet for the Scheduler.
Access | Description |
---|---|
ActiveBatch Admin |
Account is an ActiveBatch Administrator. |
Create Queues |
Account is allowed to create a Queue object. |
Connect |
Account is allowed to connect to this Job Scheduler. |
Create Objects |
Account is allowed to create ActiveBatch objects (except queues as noted below). |
Modify |
Account is allowed to manage Job Scheduler variables; Service Library and Alert Object properties. |
Full Control |
Account may issue all of the operations mentioned above. |
ActiveBatch allows you to further delegate who can create new Queues. The Queue is the only object that requires a separate security permission to allow a user to create one. Sometimes it may be important to allow an ActiveBatch non-Administrator to create a new queue. Queue objects are used to determine where a job will run (which ActiveBatch Execution Agent system). Every Job must be associated with a Queue, either Execution or Generic.
Note: To connect to a Job Scheduler you must first pass Windows Authentication regardless of the above security settings. In other words, the “Connect” access permission must be set in addition to standard Windows authentication.
If you click on the "All Permissions" button at the bottom of the Scheduler's Security property sheet, you will see a list of permissions appear (e.g. delete, modify, etc.) that apply to all user-defined objects, while other permissions only apply to specific user-defined objects (e.g. jobs and plans). All combined, it is the full list of user-defined object security permissions, where some permissions are common, and others are specific to a particular object type.
Note: The reason the All Permissions security list is present and configurable is you may have some or all child objects obtaining their security from the Scheduler root. Therefore, all possible security permissions applicable to every object type must be present and configurable to support this.
Note: Child objects can also inherit security from a parent folder or plan.
Below you will find the permissions you see when the All Permissions button is clicked. Keep in mind that not all permissions apply to all objects. The permissions applicable to each object type is described in this documentation section.
Access | Description |
---|---|
Read |
Account is allowed to read any properties/variables of the object (includes Read Variables + Read Properties). |
Read Properties |
Account is allowed to read the object's properties. |
Read Variables |
Account is allowed to read the object’s variables. |
Write |
Account is allowed to write to the object. |
Modify |
Account is allowed to modify the properties of the object (includes Read + Write). |
Delete |
Account is allowed to delete the object. |
Take Ownership |
Account is allowed to take ownership of the object. |
Use |
Account is allowed to use the object and to create an association to it. |
Manage |
Account is allowed to perform operations on the object (Enable/Disable/Soft Disable/Hold/Release and for queue objects Stop, Start, Open, Close). |
Instance Control |
Account is allowed to perform operations on the instance (Abort, Pause/Resume, Restart, Force Run, Delete, etc.). |
List/Connect |
Account may list the contents of the object or connect to the object as a virtual root. |
Create Objects |
Account is allowed create objects. |
Change Policy |
Account may change object Policies. |
Change Permissions |
Account is allowed to change permissions (set security) on the object. |
Trigger |
Account may trigger object as-is. |
Trigger w/Queue |
Account may trigger job and specify the job run on a different queue. |
Trigger w/Parameter |
Account may trigger object and specify new parameters and/or specify ActiveBatch (constant) variable(s) that override any specified at the job/plan level. |
Trigger w/Credential |
Account may trigger object and specify new security credentials that override any specified on the job/plan level. |
Full Control |
Account may issue all of the operations mentioned above. |

The Queue objects are used to determine where a job will run (which ActiveBatch Execution Agent system). Every Job must be associated with a Queue, either Execution or Generic.
Factory Default Queue security: The Administrators group is allowed Full Control access. The Authenticated Users Group is allowed Read and Use permissions.
Access | Description |
---|---|
Read |
Account is allowed to read any queue properties/variables (Includes Read Variables + Read Properties). |
Read Properties | Account is allowed to read the queue's properties. |
Read Variables | Account is allowed to read the queue's variables. |
Write |
Account is allowed to write to the queue. |
Modify |
Account is allowed to modify the properties of the queue (includes Read + Write). |
Delete |
Account is allowed to delete the queue. |
Take Ownership |
Account is allowed to take ownership of the queue. |
Use |
Account is allowed to use the queue. |
Manage |
Account is allowed to perform operations on the queue (Stop, Start, Open, Close). |
Change Permissions |
Account is allowed to change permissions (set security) on the queue. |
Full Control |
Account may issue all of the operations mentioned above. |
-
Read Variables permission refers to the ability to access the variables of a Queue. This security setting can be useful if you need to set confidential information as part of a variable.
-
Use permission is required when associating the queue to a job.

The Folder object is used to organize objects in the Object Navigation pane.
Factory Default Folder security: The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Read, List/Connect and Create Objects access.
Access | Description |
---|---|
Read |
Account is allowed to read any properties/variables of the folder (includes Read Variables + Read Properties). |
Read Properties |
Account is allowed to read the folder’s properties. |
Read Variables |
Account is allowed to read the folder’s variables. |
Write |
Account is allowed to write to the folder. |
Modify |
Account is allowed to modify the properties of the folder (includes Read + Write). |
Delete |
Account is allowed to delete the folder. |
Take Ownership |
Account is allowed to take ownership of the folder. |
Use |
Account is allowed to use the object and to create an association to it. Applicable on Push Down or Inheritance of Security only. |
Manage |
Account is allowed to perform operations on the folder (Enable/Disable/Soft Disable/Hold/Release). Applicable on Push Down or Inheritance of Security only. |
Instance Control |
Account is allowed to perform operations on the plan instance (Abort, Pause/Resume, Restart, Force Run, Delete, etc.). Applicable on Push Down or Inheritance of Security only. |
List/Connect |
Account may list the contents of the folder or connect to a folder as a virtual root. |
Create Objects |
Account is allowed to manipulate objects contained in the folder. This includes add and move. The account must also have the necessary corresponding permissions on the underlying object itself. |
Change Policy |
Account may change folder Policies. |
Change Permissions |
Account is allowed to change permissions (set security) on the folder. |
Trigger |
Account may trigger object as-is. Applicable on Push Down or Inheritance of Security only. |
Trigger w/Queue |
Account may trigger job and specify the job run on a different queue. Applicable on Push Down or Inheritance of Security only. |
Trigger w/ Parameter |
Account may trigger object and specify new parameters and/or specify ActiveBatch (constant) variable(s) that override any specified at the job/plan level. Applicable on Push Down or Inheritance of Security only. |
Trigger w/ Credential |
Account may trigger object and specify new security credentials that override any specified on the job/plan level. Applicable on Push Down or Inheritance of Security only. |
Full Control |
Account may issue all of the operations mentioned above. |
-
Create Objects permission is required to add or move any object that is nested within a folder. This is in addition to any access permission that the target object holds.
-
Read Variables permission refers to the ability to access the variables of a folder. This security setting can be useful if you need to set confidential information as part of a variable.
-
List/Connect permission is used to both enumerate the objects within a folder as well as to enable a user to connect to a folder as a “virtual root”.
-
A few of the above security permissions state: "Applicable on Push Down or Inheritance of Security only". This means that the permission is not directly applicable to the Folder object itself. It is a security permission present on the Folder's Security property sheet because:
-
Child objects are inheriting their security from the folder (child objects have their "Inherit Security from Parent Object" checkbox checked) - and therefore all permissions related to all objects must be configurable on the folder-level.
-
Child objects are not inheriting their security (child objects "Inherit Security from Parent Object" checkbox is not checked). At some point you need to update child objects' security in mass. To do this, you can set the security you want the child objects to have on the folder object, then use the "push down" feature to update the child objects security to match the security that was set on the folder. You can then set back the folder security to whatever it initially was, prior to the push down. All permissions related to all objects must be configurable on the folder-level to be able to support this feature. The term "push down" applies to the Folder property named "Replace permission entries on all child objects with entries shown here". See Assigning Object Security for more details about this topic.
-

The Plan object is used to create a workflow, typically consisting of two or more jobs that are somehow related, and may need to run in a specific order (e.g. sequentially). Plans are triggerable, but only its jobs are dispatched to Agents to run.
Factory Default Plan security: The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Read, List/Connect and Create Objects permissions.
Access | Description |
---|---|
Read |
Account is allowed to read any properties/variables of the plan (includes Read Variables + Read Properties). |
Read Properties |
Account is allowed to read the plan’s properties. |
Read Variables |
Account is allowed to read the plan’s variables. |
Write |
Account is allowed to write to the plan. |
Modify |
Account is allowed to modify the properties of the plan (includes Read + Write). |
Delete |
Account is allowed to delete the plan. |
Take Ownership |
Account is allowed to take ownership of the plan. |
Use |
Account is allowed to use the plan and to create an association to it. |
Manage |
Account is allowed to perform operations on the plan (Enable/Disable/SoftDisable or Hold/Release). |
Instance Control |
Account is allowed to perform operations on the plan instance (Abort, Pause/Resume, Restart, Force Run, Delete, etc.). Account can also take ownership of an Alert in the Alerts view and respond to it. |
List/Connect |
Account may list the contents of the plan or connect to a plan as a virtual root. |
Create Objects |
Account is allowed to manipulate objects contained in the plan. This includes add and move. The account must also have the necessary corresponding permissions on the underlying object itself. |
Change Policy |
Account may change Policies established on the plan. |
Change Permissions |
Account is allowed to change permissions (set security) on the plan. |
Trigger |
Account may trigger plan (as-is with no property overrides). |
Trigger w/ Parameter |
Account may trigger plan and specify new ActiveBatch (constant) variable(s) that override any specified at the job/plan level. |
Trigger w/ Queue |
Account may trigger job and specify the job run on a different queue. Applicable on Push Down or Inheritance of Security only. |
Trigger w/ Credential |
Account may trigger plan and specify new security credentials. |
Full Control |
Account may issue all of the operations mentioned above. |
-
Read Variables permission refers to the ability to access the variables of a Plan. This security setting can be useful if you need to set confidential information as part of a variable.
-
Create Objects permission is required to add or move any object that is nested within a plan. This is in addition to any access permission that the target object holds.
-
Use permission is required if you want to create a Reference object to the plan, or use it when creating an Instance Constraint, Completion Trigger or Alert trigger.
-
The Trigger w/Queue permission states: "Applicable on Push Down or Inheritance of Security only". This means that the permission is not directly applicable to the Plan object itself. It is a security permission present on the Plan's Security property sheet because:
-
Child objects are inheriting their security from the plan (child objects have their "Inherit Security from Parent Object" checkbox checked) - and therefore all permissions related to all objects must be configurable on the plan-level.
-
Child objects are not inheriting their security (child objects "Inherit Security from Parent Object" checkbox is not checked). At some point you need to update child objects' security in mass. To do this, you can set the security you want the child objects to have on the plan object, then use the "push down" feature to update the child objects security to match the security that was set on the plan. You can then set back the plan security to whatever it initially was, prior to the push down. All permissions related to all objects must be configurable on the plan-level to be able to support this feature. The term "push down" applies to the plan property named "Replace permission entries on all child objects with entries shown here". See Assigning Object Security for more details about this topic.
-
-
List/Connect permission is used to both enumerate the objects within a plan as well as to enable a user to connect to a plan as a “virtual root”.

The Job object is the process you wish to automate and run using ActiveBatch. The Job is sent to an Execution Agent to run. The Job has properties that include where to run the job (identified via its associated Queue object), what account to run the job with (identified via its associated User Account object), and what the payload of the job is (the work the job will be doing).
Factory Default Job Security: The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Read access.
Access | Description |
---|---|
Read |
Account is allowed to read any properties/variables of the job (includes Read Variables + Read Properties). |
Read Properties |
Account is allowed to read the job’s properties. |
Read Variables |
Account is allowed to read the job’s variables. |
Write |
Account is allowed to write to the job. |
Modify |
Account is allowed to modify the properties of the job (includes Read + Write). |
Delete |
Account is allowed to delete the job. |
Take Ownership |
Account is allowed to take ownership of the job. |
Use |
Account is allowed to use the job and to create an association to it. |
Manage |
Account is allowed to perform operations on the Template job (Enable/Disable/SoftDisable or Hold/Release). |
Instance Control |
Account is allowed to perform operations on the instance (e.g.. Abort, Pause/Resume, Restart, Delete, Force Run, etc.). Account can also take ownership of an Alert in the Alerts view and respond to it. |
Change Permissions |
Account is allowed to change permissions (set security) on the job. |
Trigger |
Account may trigger job (as-is with no property overrides). |
Trigger w/Queue |
Account may trigger job and direct job to execute on a specified queue (The queue can be selected at the time of the trigger). |
Trigger w/Parameter |
Account may trigger job and specify new input parameters to job. User may also pass new ActiveBatch (constant) variable(s) that override any specified at the job or plan level. |
Trigger w/Credential |
Account may trigger job and specify new security credentials. |
Full Control |
Account may issue all of the operations mentioned above. |
-
Read Variables permission refers to the ability to access the variables of a job. This security setting can be useful if you need to set confidential information as part of a variable.
-
Use permission is required if you want to create a Reference object to the job, or use it when creating an Instance Constraint, Completion Trigger or Alert trigger

The Schedule object is used to trigger jobs. It consists of dates and optionally times (the time can be set on the job or plan itself - or come from the Schedule).
Factory Default Schedule security : The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Read and Use permissions.
Access | Description |
---|---|
Read |
Account is allowed to read any properties of the schedule. |
Write |
Account is allowed to write to the schedule. |
Modify |
Account is allowed to modify the properties of the schedule (includes Read + Write). |
Delete |
Account is allowed to delete the schedule. |
Use |
Account is allowed to use the schedule and to create an association to it. |
Take Ownership |
Account is allowed to take ownership of the schedule. |
Change Permissions |
Account is allowed to change permissions (set security) of the schedule. |
Full Control |
All of the above access is enabled. |

The Calendar object is typically used to identify dates that a job or plan should not run on. This includes holidays and/or non business days (e.g. Saturday, Sunday).
Factory Default Calendar security: The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Read and Use access.
Access | Description |
---|---|
Read |
Account is allowed to read any properties of the calendar. |
Write |
Account is allowed to write to the calendar. |
Modify |
Account is allowed to modify the calendar (includes Read + Write). |
Delete |
Account is allowed to delete the calendar. |
Use |
Account is allowed to use the calendar and to create an association to it. |
Take Ownership |
Account is allowed to take ownership of the calendar. |
Change Permissions |
Account is allowed to change permissions (set security) of the calendar. |
Full Control |
All of the above access is enabled. |

The User Account object is used to specify security credentials. For example, the user name and password that a job should execute under, on the target Execution Agent system.
Factory Default User Account security: The Administrators group is allowed Full Control access. The Authenticated Users Group has Read access only - Use permission is not allowed for this group.
Access | Description |
---|---|
Read |
Account is allowed to read any properties/variables of the user account (Includes Read Variables + Read Properties ). |
Read Properties |
Account is allowed to read the user account properties. |
Read Variables |
Account is allowed to read the user account variables. |
Write |
Account is allowed to write to the user account. |
Modify |
Account is allowed to modify the user account (includes Read + Write). |
Delete |
Account is allowed to delete the user account. |
Use |
Account is allowed to use the user account and to create an association to it. |
Take Ownership |
Account is allowed to take ownership of the user account. |
Change Permissions |
Account is allowed to change permissions (set security) of the user account. |
Full Control |
All of the above access is enabled. |
-
Read permission allows the account to examine the properties of the object. The password is not a read level property (the password is masked).
-
Read Variables permission refers to the ability to access the variables of a user account. This security setting can be useful if you need to set confidential information as part of a variable.
-
Use permission allows the account to associate the User Account object with a Job (or any other place a User Account object is required).
Note: Exercise caution as to which accounts or groups you give Use access to for this object. Use access allows that user or group to run jobs using the associated account without having to specify a password.

The Alert Object is used to notify users that an ActiveBatch alertable condition has occurred (e.g. a job failed).
Factory Default Alert security: The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Read and Use permissions.
Access | Description |
---|---|
Read |
Account is allowed to read any properties of the alert. |
Write |
Account is allowed to write to the alert. |
Modify |
Account is allowed to modify the alert (includes Read + Write). |
Delete |
Account is allowed to delete the alert. |
Use |
Account is allowed to use the alert and to create an association to it. |
Take Ownership |
Account is allowed to take ownership of the alert. |
Change Permissions |
Account is allowed to change permissions (set security) of the alert. |
Full Control |
All of the above access is enabled. |

A Resource Object is used to set a resource that must be available before a job or plan can run. It is used in conjunction with the Resource Constraint feature.
Factory Default Resource security: The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Read and Use access.
Access | Description |
---|---|
Read |
Account is allowed to read any properties of the resource. |
Write |
Account is allowed to write to the resource. |
Modify |
Account is allowed to modify the resource (includes Read + Write). |
Delete |
Account is allowed to delete the resource. |
Use |
Account is allowed to use the resource and to create an association to it. |
Take Ownership |
Account is allowed to take ownership of the resource. |
Change Permissions |
Account is allowed to change permissions (set security) of the resource. |
Full Control |
All of the above access is enabled. |

A Service Library object is used to create your own Jobs Library job steps from various sources. Sources supported include REST services, WSDL based Web Services, .NET Assemblies, and SQL Server and Oracle stored procedures and functions.
Factory Default Service Library security: The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Read and Use access.
Access | Description |
---|---|
Read |
Account is allowed to read any properties of the service library. |
Write |
Account is allowed to write to the service library. |
Modify |
Account is allowed to modify the service library (includes Read + Write). |
Delete |
Account is allowed to delete the service library. |
Use |
Account is allowed to use the service library and to create an association to it. |
Take Ownership |
Account is allowed to take ownership of the service library. |
Change Permissions |
Account is allowed to change permissions (set security) of the service library. |
Full Control |
All of the above access is enabled. |

An Object List serves as a collection point of one or more objects that you want to associate with a job or plan for related use.
Factory Default Object List security: The Administrators group is allowed Full Control access. The Authenticated Users group is allowed Read and Use access.
Access | Description |
---|---|
Read |
Account is allowed to read any properties of the object list. |
Write |
Account is allowed to write to the object list. |
Modify |
Account is allowed to modify the object list (includes Read + Write). |
Delete |
Account is allowed to delete the object list. |
Use |
Account is allowed to use the object list and to create an association to it. |
Take Ownership |
Account is allowed to take ownership of the object list. |
Change Permissions |
Account is allowed to change permissions (set security) of the object list. |
Full Control |
All of the above access is enabled. |