Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Application setup
Controlling user access and security
The System Administrator can control user access to ITSMA Service Management in the following five ways:
-
Setting individual access restrictions in operator records
- Assigning capability words to operators
- Assigning operators to application profiles
- Assigning roles to operators
-
Assigning Security Roles to operators for Process Designer enabled modules
- Assigning operators to assignment groups
- Assigning operators to security groups
- Assigning operators to user role descriptions
- Creating a login profile
- Modifying field-level rights
- Enabling application time limits
- Enabling file attachment restrictions
- Enabling password requirements
- Enabling printing restrictions
- Enabling user session restrictions
-
Setting access restrictions by tailoring the application layer
- Creating displayoptions and displayscreens
- Creating document engine objects, states, and processes
- Creating formatctrl
- Creating menus
- Defining DVD controls
-
Setting global access restrictions in the System Wide Company record
- Enabling account expiration times
- Enabling active integrations to external applications
- Enabling application time limits
- Enabling login restrictions
- Enabling password requirements
-
Setting global access restrictions to application tables in Mandanten
- Defining security group access to database tables
- Filtering records visible to users by security groups
- Limiting access to records by adding security group restricting queries
-
Setting global access restrictions in the initialization file:
- Defining named users and restricting login to these named users only
- Enabling Secure socket layer (SSL) connections between the server and clients
- Enabling shared Mandanten file restrictions
In some cases, these five levels of access restrictions describe the same settings. In such cases, Service Management uses the following precedence to determine what access restrictions apply:
- Settings in the initialization file override all other security settings
- Tailoring settings override security settings in individual operator records and the System Wide Company Record
- Settings in an individual operator records and Mandanten override security settings in the System Wide Company Record
- Settings in the System Wide Company Record apply to all operators that have no other security settings
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to docs.feedback@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: