Next Topic

Previous Topic

Book Contents

User Security

User Security determines the access users have to functions and data objects within the VSA. Understanding User Security configuration is easiest if you consider each of the following concepts in the order presented.

  1. Scope Data Objects - A data object is an object that you create and name. Scope data objects are important enough to warrant being secured system-wide. Scope data objects include organizations, machine groups, machines, departments and service desks. Scope data objects are defined first, before being assigned to scopes.
  2. Scopes - Sets of data objects that users have visibility of within the VSA.
  3. User Roles - Sets of VSA functions that VSA users can perform. A function acts on data objects. Examples of functions are opening, adding, editing or deleting records.
  4. User Role Types - Built-in classifications that determine the types of user-role-based licenses to apply to users in user roles.
  5. Machine Roles - Sets of Portal Access functions that machine users can perform when displaying the VSA Portal Access page on their machine.
  6. Machine Role Types - Built-in classifications that determines the type of machine-role-based licenses to apply to machines in a machine role.
  7. Users - Refers to VSA users. Users of machines with agents on them are always identified as machine users to distinguish them from VSA users.

In This Section

Users

User Roles

Machine Roles

Scopes

Sharing User-Owned Objects

Logon Hours

User History