This tab is where object security is configured. Security in ActiveBatch mirrors how security is granted using Windows security. That is, permissions applicable to the object (Read, Write, Modify, Delete, etc.) are Allowed or Denied for the Active Directory users and/or groups assigned to the object.
Note: The Owner field has been omitted in the above figure intentionally.
To add, edit or remove security access permissions requires the user to have “Change Permissions” access to the object.
The table below lists all security access permissions, using Windows conventions, that you will see on a Folder's security property sheet.
Read
|
Account is allowed to view any properties/variables of the Folder (Note: Read implies both Read Properties and Read Variables).
|
Read Properties
|
Account is allowed to read the properties of the Folder.
|
Read Variables
|
Account is allowed to read the variables of the Folder.
|
Write
|
Account is allowed to write to the Folder.
|
Modify
|
Account is allowed to read/write any properties of the Folder (Read + Write).
|
Delete
|
Account is allowed to delete the Folder.
|
Take Ownership
|
Account is allowed to take ownership of the Folder.
|
Use
|
Account is allowed to use the Folder. Applicable on Push Down or Inheritance of Security only.
|
Manage
|
Account is allowed to perform operations (Enable/Disable or Hold/Release). Applicable on Push Down or Inheritance of Security only.
|
List/Connect
|
Account is allowed to list objects in the Folder and/or connect to the Folder as a virtual root.
|
Instance Control
|
Account is allowed to manage instances (e.g. restart, cancel, force run, etc.) Applicable on Push Down or Inheritance of Security only.
|
Create Objects
|
Account is allowed to manipulate objects contained in the Folder. This includes add, delete and move. The account must also have the necessary corresponding permissions on the underlying object itself.
|
Change
Permissions
|
Account is allowed to change permissions (set security) on the Folder.
|
Trigger
|
Account is allowed to perform the trigger operation. Applicable on Push Down or Inheritance of Security only.
|
Trigger and
Change Queue
|
Account is allowed to trigger a Job and specify a Queue where it should run. Applicable on Push Down or Inheritance of Security only.
|
Trigger and Change
Parameters
|
Account is allowed to trigger an object and specify new or existing ActiveBatch variable(s) and/or parameters that override any specified at the Job/Plan level. Applicable on Push Down or Inheritance of Security only.
|
Trigger and Change
Credentials
|
Account is allowed to trigger a Plan or Job and specify new security credentials for the Plan’s variables that require security credentials. Applicable on Push Down or Inheritance of Security only.
|
Full Control
|
Account may issue all of the operations mentioned above.
|
In the above table, there are several references that state: Applicable on Push Down or Inheritance of Security only. This means the security permission is not applicable to the Folder object itself. For example, you can't trigger a Folder and therefore there are no instances to control. The permissions are there because child objects in the Folder may obtain their security from the Folder (which is an option, not a requirement), and if they do, all permissions related to all object types must be present on the Folder's security property sheet. The reference to "Push Down" and "Inheritance of Security" are the two ways that child objects can obtain their security from the Folder. See below for more details.
Push down - Push down provides you with a way to propagate the Folder's permissions to the objects nested within the Folder. This means the Folder's existing child objects (and nested child objects) will have their security removed, then replaced to match the Folder's security groups and/or user names and their associated permissions. The "Replace Permission entries on all child object with entries shown here" checkbox (as depicted in the above image) enables the push down action. Note! You will only see this property if the Folder's "Inherit Security from Parent Object" property is not checked.
When you check the "Replace permission entries..." checkbox, then save the Folder, the push down action will take place. Therefore, the "Replace permission entries..." checkbox is an action item, not a static property setting. Since it is an action item, the next time you edit the Folder's security property sheet, the property will be unchecked, by design. You can use this feature as often as you would like, since updating Folder security does not automatically update child object security, unless child object security is inheriting security from its parent object.
Inheritance of Security - Child objects inherit security from its parent container when the child object's "Inherit Security from Parent Object" property is checked. This property is on the security property sheet of all objects, including Plan and Folder objects (they can inherit their security from their parent container). In addition, when Inherit Security from Parent Object is checked on the Folder, you will see another property named "Enable inherit security on all child objects". This property allows you to push down "inherit security" to all child objects (and nested child objects) within the Folder. This process removes existing child object security and replaces it with inherit security by enabling (checking) the "Inherit Security from Parent Object" property for each child object. When you check the "Enable inherit security on all child objects." checkbox, then save the Folder, the push down action occurs during the save. Therefore, the "Enable inherit security on all child objects" checkbox is an action item, not a static property setting. Since it is an action item, the next time you edit the Folder's security property sheet, the property will be unchecked, by design. You can use this feature as often as you like.
Note: Pushing down security (users/groups) is an option that allows you to quickly update child object security within a container. It is more commonly used when a customer decides existing objects created using factory default security
Factory default security works as follows - When any new object type is created, the security assigned to the object includes two Active Directory groups - Authenticated Users and Administrators. Administrators are granted Full Control access to all objects, and Authenticated Users are granted a more limited set of permissions. does not match their security requirements. It could be quite tedious to update each object with new security, hence the ability to push down security. It was also used when a container's security changed. The only way to propagate the change was by using the push down feature. With the introduction of inherit security, you can now change container security which will dynamically update child object security, as long as the child objects have the "Inherit Security from Parent Object" checkbox checked. In order to allow customers to easily switch to inherit security (at the time it was introduced), the push down inherit security option was made available, again, to speed up the process of making a sweeping security change.
Note: The easiest approach to managing security would be to determine what container(s) you need to set security on, add the desired users and/or groups and grant the appropriate permissions, then create a default policy
A default policy allows you to preset a new object's properties to override factory default property values, and/or preset properties that are blank by default. See Default Policy for more details. for each (new) object type that will be added to the container - with the object's "Inherit Security from Parent Object" checkbox enabled (it is not enabled by default). If security changes on the parent container, it is automatically reflected in the child objects.
The owner of a Folder is the user who first creates the Folder. The owner of a Folder is implicitly granted Full Control access permission, and this cannot be changed. To change ownership, click the Take Ownership button and confirm the resulting dialog. You can also take ownership by right-clicking on the Folder in the Object Navigation pane, then selecting Advanced > Take Ownership. If ownership is changed, the new owner is automatically granted Full Control access to the object, and this cannot be changed. Note: You must be granted Take Ownership permission to take ownership of an object.
The Deny permission is generally used for users who have been granted access based on a group membership, but there is a need to override this for a user. Deny takes precedence over Allow.
When the "Inherit Security from Parent Object" is checked, you cannot add, remove or modify security permissions for the existing users/groups. Therefore the discussion below assumes this property is not checked.
To add new access permissions, click the Add button and follow the dialog as discussed below under the Add Security Dialog heading. To remove an existing account name, select the listed account and click the Remove button. To change existing access permissions, select the account and then select a new Permission Type (either Grant or Deny access) and a new Permission (one of the access permissions listed in the above table).
Add Security Dialog
The dialog is similar to that of other Windows objects, and leverages Active Directory services. The Locations button allows you to select either the Job Scheduler machine or any applicable domain. Clicking the Advanced button allows you to search for specific users and/or groups. Alternatively, you may enter object names (a user or group) in the large edit box. Clicking the Check Names button allows you to validate the accounts. Click the OK button to add the selected Account to the object’s security list.