Actions on security items

The following matrix shows the actions that users or groups with standard roles can perform on the different scheduling and security item types. The names in parentheses represent the corresponding item values that you must use when defining role-based security via the Orchestration CLI.

Table 1. Standard security role actions by item type
Security item type ADD MODIFY DELETE DISPLAY LIST USE UNLOCK Item-specific actions
Workstation (cpu) LINK, UNLINK
Workflow (schedule) SUBMIT, CANCEL, ADDDEP, DELDEP, RELEASE, ALTPRI
Task (job) SUBMIT, SUBMITDB, CANCEL, ADDDEP, DELDEP, RELEASE, KILL, RERUN, CONFIRM, ALTPRI
Folder (folder) ACL
Endpoint (endpoint) LINK, UNLINK
Event source (eventsource) LINK, UNLINK
AI Agent (aiagent) TEST, DEPLOY, UNDEPLOY
Resource (resource) None
Credentials (credentials) None
Calendar (calendar) None
Variable table (vartable) None

The following table shows the specific actions that users or groups with administrative roles can perform. See the names in parentheses for the corresponding action and item values to use in the Orchestration CLI.

Table 2. Administrative tasks that users or groups can perform
Administrative Category Administrative actions
API keys administrator
  • Delete all API keys (securityrole ADMIN - DELETEALLAPIKEYS)
  • List all API keys (securityrole ADMIN - LISTALLAPIKEYS)
  • Create personal API Key (securityrole ADMIN - CREATEPERSONALAPIKEY)
  • Create service API Key (securityrole ADMIN - CREATESERVICEAPIKEY)
Agent management
  • Register agent (securityrole ADMIN - REGISTERAGENT)
Plug-in management
  • Install plug-in (securityrole ADMIN - INSTALLPLUGIN)
  • Delete plug-in (securityrole ADMIN - DELETEPLUGIN)
  • List plug-ins (securityrole ADMIN - LISTPLUGIN)
UnO AI Pilot management
  • Manage AI Pilot (securityrole ADMIN - MANAGEAIPILOT)