Security role definition
In the role-based security model, a security role represents a certain level of authorization and includes the set of actions that users or groups can perform. You can include multiple security role definitions in the same text file, along with security domain definitions and access control list definitions.
Each security role definition has the following format and arguments:
Syntax
securityrole security_role_name
[description "description"]
object_type access[=action[,action]...]
[object_type access[=action[,action]...]]...
end
[securitydomain ...]
[accesscontrollist ...]
Arguments
- securityrolesecurityrolename
- Specifies the name of the security role. The name must start with a letter, and can contain alphanumeric characters, dashes, and underscores. It can contain up to 16 characters.
- description ”description”
- Provides a description of the security role. The description can contain up to 120 alphanumeric characters. The text must be enclosed within double quotes.
- object_type access[=action[,action]...]
- For each object type, specifies a list of actions that users or groups can perform on that specific object type.
Security object types shows the different object types
and how they are referenced with composer and with the Dynamic Workload Console:
Object type - composer | Object type - Dynamic Workload Console | Description |
---|---|---|
action | Actions | Actions defined in scheduling event rules |
calendar | Calendars | User calendars |
cpu | Workstations | Workstations, domains, and workstation classes |
event | Events | Event conditions in scheduling event rules |
eventrule | Event Rules | Scheduling event rule definitions |
file | Files | HCL Workload Automation database files |
folder | Folders | The folder within which jobs and job streams are defined. |
job | Jobs | Scheduled jobs and job definitions |
lob | HCL Application Lab | HCL Application Lab |
parameter | Parameters | Local parameters |
prompt | Prompts | Global prompts |
report | Reports | The following reports in Dynamic Workload Console:
|
resource | Resources | Scheduling resources |
runcygrp | Run Cycle Groups | Run cycle groups |
schedule | Job Streams | Job streams |
userobj | User Objects | User objects |
vartable | Variable Tables | Variable tables |
wkldappl | Workload Application | Workload application |
Actions that users or groups
can perform on the different objects shows the actions that users or
groups can perform on the different objects.
Actions that users or groups can perform on the different objects | |||
---|---|---|---|
acl | deldep | modify | stop |
add | delete | release | submit |
adddep | display | reply | submitdb |
altpass | fence | rerun | unlink |
altpri | kill | resetfta | unlock |
build | limit | resource | use |
cancel | link | run | |
confirm | list | shutdown | |
console | manage | start |
For the actions that users or groups can perform on a specific object type, for each of the HCL Workload Automation task, see Managing security roles.
Examples
The following example defines security role
SECROLE1
and security role
SECROLE2
:
SECURITYROLE SECROLE1
DESCRIPTION "Sample Security Role"
SCHEDULE ACCESS=ADD,ADDDEP,ALTPRI,CANCEL,DELDEP,DELETE,
DISPLAY,LIMIT,MODIFY,
RELEASE
RESOURCE ACCESS=ADD,DELETE,DISPLAY,MODIFY,RESOURCE,USE,LIST,UNLOCK
PROMPT ACCESS=ADD,DELETE,DISPLAY,MODIFY,REPLY,USE,LIST,UNLOCK
FILE ACCESS=BUILD,DELETE,DISPLAY,MODIFY,UNLOCK
FOLDER ACCESS=ADD,DELETE,DISPLAY,MODIFY,USE,LIST,UNLOCK,ACL
CPU ACCESS=LIMIT,LINK,MODIFY,SHUTDOWN,START,STOP,UNLINK,LIST,UNLOCK,RUN
PARAMETER ACCESS=ADD,DELETE,DISPLAY,MODIFY,LIST,UNLOCK
CALENDAR ACCESS=ADD,DELETE,DISPLAY,MODIFY,USE,LIST,UNLOCK
REPORT ACCESS=DISPLAY
EVENTRULE ACCESS=ADD,DELETE,DISPLAY,MODIFY,LIST,UNLOCK
ACTION ACCESS=DISPLAY,SUBMIT,USE,LIST
EVENT ACCESS=USE
VARTABLE ACCESS=ADD,DELETE,DISPLAY,MODIFY,USE,LIST,UNLOCK
WKLDAPPL ACCESS=ADD,DELETE,DISPLAY,MODIFY,LIST,UNLOCK
RUNCYGRP ACCESS=ADD,DELETE,DISPLAY,MODIFY,USE,LIST,UNLOCK
LOB ACCESS=USE
END
SECURITYROLE SECROLE2
DESCRIPTION "Sample Security Role"
SCHEDULE ACCESS=ADD,ADDDEP,ALTPRI,CANCEL,DELDEP,DELETE,
DISPLAY,LIMIT,MODIFY,
RELEASE
RESOURCE ACCESS=ADD,DELETE,DISPLAY,MODIFY,RESOURCE,USE,LIST,UNLOCK
PROMPT ACCESS=ADD,DELETE,DISPLAY,MODIFY,REPLY,USE,LIST,UNLOCK
END
The following example defines a new security role
APP_ADMIN
, for the user APP1_ADMIN
and assigns
administrator permissions on the folder hierarchy /PRD/APP1/, so that the
APP1_ADMIN
user can create access control lists to give other users access to the
objects in this folder or its sub-folders:- Security role definition
-
SECURITYROLE APP_ADMIN DESCRIPTION "Security Role" JOB ADD,MODIFY,SUBMITDB,USE,ADDDEP,RUN,RELEASE,REPLY,DELETE,DISPLAY, CANCEL,SUBMIT,CONFIRM,RERUN,LIST,DELDEP,KILL,UNLOCK,ALTPRI SCHEDULE ADD,ADDDEP,ALTPRI,CANCEL,DELDEP,DELETE,DISPLAY,LIMIT,MODIFY,RELEASE FOLDER ADD,DELETE,DISPLAY,MODIFY,USE,LIST,UNLOCK,ACL
- Security file
-
USER APP_ADMINofAPP1 CPU=@+LOGON="APP_ADMIN" BEGIN JOB FOLDER="/PRD/APP1/","/PRD/APP1" + CPUFOLDER = / ACCESS=ADD,ADDDEP, ALTRPRI,CANCEL,SUBMIT, CONFIRM,RERUN,LIST,DELDEP,KILL,UNLOCK,ALTPRI SCHEDULE FOLDER="/PRD/APP1/","/PRD/APP1" + CPUFOLDER = / ACCESS=ADD,ADDDEP, ALTPRI,CANCEL,DELDEP, DELETE,DISPLAY,LIMIT,MODIFY,RELEASE FOLDER NAME="/PRD/APP1/","PRD/APP1" ACCESS=ADD,DELETE,DISPLAY,MODIFY,USE, LIST,UNLOCK,ACL