Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Permissions reference
- Server objects permissions
- Server property and reboot permissions
- Device group permissions
- Server Agent deployment permissions
- Virtualization service management permissions
- OS Provisioning permissions
- Software Management Permissions
- Chef Cookbook management permissions
- Application configuration management permissions
- Patch Management for Windows Permissions
- Patch management for Ubuntu permissions
- Patch Management for Solaris Permissions
- Solaris patch policy management permissions
- Patch Management for Other UNIX Permissions
- Audit and remediation permissions
- Compliance view permissions
- Job permissions
- Script execution permissions
- Flow permissions for Operations Orchestration
- Service Automation Vizualizer permissions
Application configuration management permissions
The following table specifies the permissions required by users to perform specific actions with application configurations in the SA Client. For security administrators, the table answers this question: To perform a particular action, what permissions does a user need?
In addition to the action permissions listed in the Application Configuration Management Permissions Required for User Actions table, every user action also requires the Managed Servers and Groups permission.
In the Application Configuration Management Permissions Required for User Actions table, the Server Permission column is for the servers referenced by the application configuration or configuration template. Server permissions are specified by the Customer, Facility, and Device Groups permissions in the SA Client. In the Application Configuration Management Permissions Required for User Actions table, the Folder Permission column is for the folders in the SA Library that contain the application configurations and configuration templates.
To perform an action, the user requires several permissions. For example, to attach an application configuration to a server, the user must have the following permissions:
- Manage Application Configurations: Read
- Manage Configuration Templates: Read
- Manage Installed Configuration and Backups on Servers: Read & Write
- Managed Servers and Groups
- Read & Write permissions to the facility, device group, and customer of the server
Read permission for the folder in the SA library that contains the application configuration or template
The User Actions Allowed by Application Configuration Management Permissions table lists the actions that users can perform with application configurations for each permission. The User Actions Allowed by Application Configuration Management Permissions table has the same data as the Application Configuration Management Permissions Required for User Actions table, but is sorted by permission. Although not indicated in the User Actions Allowed by Application Configuration Management Permissions table, the Managed Servers and Groups permission is required for all OS provisioning actions.
For security administrators, the User Actions Allowed by Application Configuration Management Permissions table answers this question: If a user is granted a particular permission, what actions can the user perform?
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to hpe_sa_docs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: