Sun N1 Service Provisioning System 5.1 System Administration Guide

Folder-Specific Permissions

You can set folder-specific permissions on the folder's Details page or by using the fdb.f.mp command. For more information about folders, see Introduction to Folders.

For instructions on how to implement folder-specific permissions, see How to Modify the Folder Permissions of a User Group.

The following list includes all folder-specific permissions.

Folder-specific Permission Characteristics

Create, Edit, and Delete Permission

When you assign Create, Edit, Delete permission to a user group, members of the user group are able to perform several tasks in the folder. Assigning Create, Edit, Delete permission to a user group automatically assigns Run Component Procedures and Check In Current and Configure permission to the user group.

You need to be particularly careful about assigning Create, Edit, Deletepermission to a user group when that user group also has Allow on Host Set permission. Users in this type of user group will have free reign over a particular host set since they will be able to write plans and execute them as they choose.

Run Component Procedures Permission

When you assign Run Component Procedures permissions to a user group, members of the user group are able to execute plans that are generated by directly running component procedures. These plans are created from component procedures and are stored in the /system/autogen folder. Run Component Procedures permissions is assigned from the folder that contains the component that generated the plans.

Run Component Procedures permission is granted automatically when a user is granted Create, Edit, Delete permission. However, you might want to exclusively grant the Run Component Procedures permissions when you want a user group to have permission to run only component procedures or plans that have already been written. This permission is particularly useful if you have one user writing plans and another user running them, and you don't want the users to perform tasks outside of their functional expertise.


Note –

Run Component Procedures permission is an extension of the Allow on Host Set permission. You can only run component procedures on the host set defined by the Allow on Host Set permission.



Note –

If component procedures contain variable sets that require user input, the user who runs the component procedure will need to belong to a user group that has Check In Current and Configure permission.


There are a few scenarios where you need to be particularly careful about assigning Run Component Procedures permission to user groups.

Check In Current and Configure

When you assign Check In Current and Configure permission to a user group, members of the user group are able to check in new versions of components and create, edit or delete component variable settings.

Check In Current and Configure permission is granted automatically when a user is granted Create, Edit, Delete permission. However, you might want to exclusively grant the Check In Current and Configure permission when you want someone to be able to perform deployments but not be able to manipulate the components in a folder.

Operations that are not allowed with Check In Current and Configure permission include the following.

Allow on Host Set

When you assign Allow on Host Set permission to a user group, members of the user group are able to execute custom plans and generated plans on a single host set. This permission also allows users to create a dependency on a component that is installed on a particular host.


Note –

For a user to be able to run component procedures, the user must belong to a user group with Allow on Host Set and Run Component Procedures permissions assigned. The host set defined by the Allow on Host Set permission establishes which hosts the component procedure can be run on.


Equivalent Permissions in the CLI

The CLI and browser interface have a different naming scheme for user permissions. The following table lists the browser interface permission names and their CLI counterparts.

Table 3–1 HTML and CLI permission names

HTML User Interface Names 

Command-Line Interface Names 

Create, Edit, Delete

write

Run Component Procedures

autorun

Check In Current and Configure

checkin-current

Allow on Host Set

execute