Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Permissions reference
- Server objects permissions
- Server property and reboot permissions
- Device group permissions
- Server Agent deployment permissions
- Virtualization service management permissions
- OS Provisioning permissions
- Software Management Permissions
- Chef Cookbook management permissions
- Application configuration management permissions
- Patch Management for Windows Permissions
- Patch management for Ubuntu permissions
- Patch Management for Solaris Permissions
- Solaris patch policy management permissions
- Patch Management for Other UNIX Permissions
- Audit and remediation permissions
- Compliance view permissions
- Job permissions
- Script execution permissions
- Flow permissions for Operations Orchestration
- Service Automation Vizualizer permissions
Software management permissions
The following table specifies the Software Management permissions required by users to perform specific actions in the SA Client. For security administrators, the table answers this question: To perform a particular action, what permissions does a user need?
If a customer is assigned to a folder, then customer constraints might limit the objects that can be associated with a software policy contained in the folder. For a list of tasks affected by these constraints, see Folders, customer constraints, and software policies.
To install software, you must belong to a user group that has the install software permissions. This user group must also have folder permissions for the software you want to install.
User Action |
Action Permission |
Server Permission (Customer, Facility, Device Group) |
Folder Permissions |
---|---|---|---|
Software policy |
|||
Create Software Policy |
Manage Software Policy: Read & Write |
N/A |
Write |
Delete Software Policy |
Manage Software Policy: Read & Write |
N/A |
Write |
Open Software Policy (View) |
Manage Software Policy: Read |
N/A |
Read |
Edit Software Policy Properties |
Manage Software Policy: Read & Write |
N/A |
Write |
Add Packages |
Manage Software Policy: Read & Write Manage Packages: Read |
N/A |
Folder containing the software policy: Write |
Add RPM Packages |
Manage Software Policy: Read & Write Manage Packages: Read |
N/A |
Folder containing the software policy: Write |
Add Patches |
Manage Software Policy: Read & Write Manage Patches: Read |
N/A |
Folder containing the software policy: Write |
Add Application Configurations |
Manage Software Policy: Read & Write Manage Application Configuration: Read |
N/A |
Folder containing the software policy: Write |
Add Scripts |
Manage Software Policy: Read & Write Manage Server Scripts: Read |
N/A |
Folder containing the software policy: Write |
Add Server Objects |
Manage Software Policy: Read & Write Manage Packages: Read |
N/A |
Folder containing the software policy: Write |
Add Software Policies |
Manage Software Policy: Read & Write |
N/A |
Folder containing the software policy: Write |
Remove Packages |
Manage Software Policy: Read & Write |
N/A |
Write |
Remove RPM Packages |
Manage Software Policy: Read & Write |
N/A |
Write |
Remove Patches |
Manage Software Policy: Read & Write |
N/A |
Write |
Remove Application Configurations |
Manage Software Policy: Read & Write |
N/A |
Write |
Remove Software Policies |
Manage Software Policy: Read & Write |
N/A |
Write |
Remove Scripts |
Manage Software Policy: Read & Write |
N/A |
Write |
Remove Server Objects |
Manage Software Policy: Read & Write |
N/A |
Write |
Install/ Uninstall Software |
Manage Software Policy: Read Allow Attach/Detach Software Policy: Yes Allow Install/Uninstall Software: Yes Model Public Device Groups: Yes (Required if you remediate a public device group) |
Read & Write |
Read |
Attach Software Policy |
Manage Software Policy: Read Allow Attach/Detach Software Policy: Yes Model Public Device Groups: Yes (This permission is required if you are attaching the software policy to a public device group) |
Read & Write |
Read |
Detach Software Policy |
Manage Software Policy: Read Allow Attach/Detach Software Policy: Yes Model Public Device Groups: Yes (This permission is required if you are attaching the software policy to a public device group) |
Read & Write |
Read |
Remediate |
Manage Software Policy: Read Allow Remediate Servers: Yes |
Read & Write |
Read |
Run ISM Control |
Manage Software Policy: Read Allow Run ISM Control: Yes Model Public Device Groups: Yes (Required if you run ISM Control on a public device group) |
Read & Write |
Read |
Duplicate Zip Package |
Manage Software Policy: Read & Write |
N/A |
Write |
Edit ZIP Installation Directory |
Manage Software Policy: Read & Write |
N/A |
Write |
Scan Software Compliance |
N/A |
Read |
N/A |
Rename Software Policy |
Manage Software Policy: Read & Write |
N/A |
Write |
Cut Software Policy |
Manage Software Policy: Read & Write |
N/A |
Write |
Copy Software Policy |
Manage Software Policy: Read |
N/A |
Read |
Paste Software Policy |
Manage Software Policy: Read & Write |
N/A |
Source Folder: Read (for copy and paste) Source Folder: Write (for cut and paste) Destination Folder: Write |
Move Software Policy |
Manage Software Policy: Read & Write |
N/A |
Source Folder: Write Destination Folder: Write |
Folder |
|||
Create Folder |
N/A |
N/A |
Write |
Delete Folder |
N/A |
N/A |
Write |
Open Folder |
N/A |
N/A |
Read |
View Folder Properties |
N/A |
N/A |
Read |
Edit Folder Properties |
N/A |
N/A |
Write |
Manage Folder Permissions |
N/A |
N/A |
Edit Folder Permissions |
Cut Folder |
N/A |
N/A |
Write |
Copy Folder |
N/A |
N/A |
Read |
Paste Folder |
N/A |
N/A |
Source Folder: Read (for copy and paste) Source Folder: Write (for cut and paste) Destination Folder: Write |
Move Folder |
N/A |
N/A |
Source Folder: Write Destination Folder: Write |
Rename Folder |
N/A |
N/A |
Write |
Package |
|||
Import Package |
Manage Package: Read & Write |
N/A |
Write |
Export Package |
Manage Package: Read |
N/A |
Read |
Open Package (View) |
Manage Package: Read |
N/A |
Read |
Edit Package Properties |
Manage Package: Read & Write |
N/A |
Read |
Delete Package |
Manage Package: Read & Write |
N/A |
Write |
Rename Package |
Manage Package: Read & Write |
N/A |
Write |
Cut Package |
Manage Package: Read & Write |
N/A |
Write |
Paste Package |
Manage Package: Read & Write |
N/A |
Source Folder: Read (for copy and paste) Source Folder: Write (for cut and paste) Destination Folder: Write |
Move Package |
Manage Package: Read & Write |
N/A |
Source Folder: Write Destination Folder: Write |
The User actions allowed by software management permissions table lists the actions that users can perform for each Software Management permission. The User actions allowed by software management permissions table has the same data as the Software management permissions required for user actions table, but is sorted by action permission. For security administrators, the User actions allowed by software management permissions table answers this question: If a user is granted a particular action permission, what actions can the user perform?
Action Permission |
User Action |
Server
|
Folder Permissions |
---|---|---|---|
Manage Software Policy: Read & Write |
Create Software Policy |
N/A |
Write |
Delete Software Policy |
N/A |
Write |
|
Edit Software Policy |
N/A |
Write |
|
Rename Software Policy |
N/A |
Write |
|
Cut Software Policy |
N/A |
Write |
|
Paste Software Policy |
N/A |
Write |
|
Move Software Policy |
N/A |
Write |
|
Remove Packages |
N/A |
Write |
|
Remove Patches |
N/A |
Write |
|
Remove Application Configurations |
N/A |
Write |
|
Remove Scripts |
N/A |
Write |
|
Remove Server Objects |
N/A |
Write |
|
Remove Software Policy |
N/A |
Write |
|
Duplicate ZIP packages |
N/A |
Write |
|
Manage Software Policy: Read |
Open Software Policy (View) |
N/A |
Read |
Copy Software Policy Properties |
N/A |
Read |
|
Manage Software Policy: Read & Write And Manage Package: Read |
Add Packages Add RPM Packages |
N/A |
Folder containing the software policy: Write Folder containing the package: Read |
Manage Software Policy: Read & Write And Manage Patches: Read |
Add Patches |
N/A |
Folder containing the software policy: Write Folder containing the patch: Read |
Manage Software Policy: Read & Write And Manage Application Configuration: Read |
Add Application Configurations |
N/A |
Folder containing the software policy: Write Folder containing the application configuration: Read |
Manage Software Policy: Read & Write |
Add Software Policies |
N/A |
Folder containing the software policy: Write Folder containing the software policy to be added to another software policy: Read |
Manage Software Policy: Read & Write And Manage Server Scripts: Read |
Add Scripts |
N/A |
Folder containing the software policy: Write Folder containing the scripts: Read |
Manage Software Policy: Read & Write And Manage Packages: Read |
Add Server Objects |
N/A |
Folder containing the software policy: Write Folder containing the server objects: Read |
Manage Software Policy: Read & Write
|
Remove Packages |
N/A |
Write |
Remove RPM Packages |
N/A |
Write |
|
Remove Patches |
N/A |
Write |
|
Remove Application Configurations |
N/A |
Write |
|
Remove Scripts |
N/A |
Write |
|
Remove Server Objects |
N/A |
Write |
|
Remove Software Policies |
N/A |
Write |
|
Manage Software Policy: Read And Allow Attach/Detach Software Policy: Yes And Model Public Device Groups: Yes (Required if you are attaching the software policy to a public device group) |
Attach Software Policy
|
Read & Write |
Read |
Detach Software Policy |
Read & Write |
Read |
|
Manage Software Policy: Read And Allow Remediate Servers: Yes |
Remediate |
Read & Write |
Read |
Manage Software Policy: Read And Allow Attach/Detach Software Policy: Yes And Allow Install/Uninstall Software: Yes And Model Public Device Groups: Yes (Required if you remediate a public device group) |
Install/ Uninstall Software |
Read & Write |
Read |
Manage Software Policy: Read And Allow Run ISM Control: Yes And Model Public Device Groups: Yes (Required if you run ISM Control on a public device group) |
Run ISM Control |
Read & Write |
Read |
Manage Package: Read & Write |
Import Package |
N/A |
Write |
Delete Package |
N/A |
Write |
|
Rename Package |
N/A |
Write |
|
Cut Package |
N/A |
Write |
|
Paste Package |
N/A |
Write |
|
Move Package |
N/A |
Write |
|
Manage Package: Read & Write |
Edit Package Properties |
N/A |
Read |
Manage Package: Read |
Export Package |
N/A |
Read |
Open Package (View) |
N/A |
Read |
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to hpe_sa_docs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: