Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Configuration Management security
Configuration Management security areas
The security areas for Configuration Management are Configuration Item and Configuration Management Configuration. These areas contain the default security rights and settings for the Configuration Management module. The security right settings will be inherited by any new roles created in an area when no other settings are specified for that security role.
These security areas are used to set permissions to operators to provide access to particular area of Configuration Management. The following table lists the areas and the relevant Configuration Management menu items the operators can access.
Area |
System Navigator menu items for this area |
---|---|
Configuration Item | This area contains the default security rights and settings for Configuration Item. The rights will be copied to new roles created for this area. However, the settings will only be inherited if there are no settings specified on the Role. |
Configuration Management Configuration |
This area contains the default security rights and settings for Configuration Management configuration. The rights will be copied to new roles created for this area. However, the settings will only be inherited if there are no settings specified on the Role. Note When you set the security rights for a security role in the Configuration Management Configuration area:
|
Default rights
The default rights defined in areas will be inherited when you create new security roles. The following table shows the out-of-box default rights defined in the Configuration Item and Configuration Management Configuration areas.
Area Name | View | New | Update | Delete/Close | Expert | Admin |
---|---|---|---|---|---|---|
Configuration Item | TRUE | FALSE | Never | Never | FALSE | FALSE |
Configuration Management Configuration | FALSE | FALSE | FALSE | FALSE |
Default settings
The default settings defined in areas will be inherited when you create new security roles. In an out-of-box system, none of the default settings is checked or set in the Configuration Item and Configuration Management Configuration areas.
Configuration Management security roles and settings
The out-of-box security roles for the Configuration Management module include the following:
- Configuration Administrator
- Configuration Auditor
Out-of-box role rights
Based on the mapping rules, the rights and settings in previous security profiles are mapped to the rights and settings in the Configuration Management area specified in the corresponding security roles. See the table below for the out-of-box security rights in the Configuration Item and Configuration Management Configuration areas. This table only lists the new security roles that have different settings with the default rights.
Area Name | Role Name | View | New | Update | Delete/Close | Modify Template | Expert | Admin |
---|---|---|---|---|---|---|---|---|
Configuration Item | Configuration Administrator | TRUE | TRUE | Always | Never | FALSE | FALSE | FALSE |
Configuration Auditor | TRUE | TRUE | Always | Never | FALSE | FALSE | FALSE | |
Configuration Management Configuration | Configuration Administrator | FALSE | FALSE | Never | Never | FALSE | FALSE | FALSE |
Configuration Auditor | FALSE | FALSE | Never | Never | FALSE | FALSE | FALSE |
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to docs.feedback@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: