Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Process Designer security model
The Process Designer security model provides a consistent method of assigning permissions to users across all facets of Service Manager data and accounts for out-of-box rights that can be configured for a specified role within an area. It also provides standardized methods to manage user rights.
Note Process Designer security model is implemented for Knowledge Management, and Service Level Management modules. For all other areas and modules, the traditional security features for Service Manager still apply.
The Process Designer security model includes the following components:
-
Area: An area defines a specific functional area or module within Service Manager, such as Knowledge Management or Knowledge Management administration. Each area definition includes default rights that are copied to the role whenever a new role is created. In addition to the out-of-box areas, system administrators are able to define additional areas.
-
Rights: The system includes a set of rights such as view, new, update, and delete that control an operator's data access. When an administrator creates a role, the default rights from each area are used to set the rights for that role. Rights can be modified for a specific area and role by an administrator that has update rights for the area and role. Each combination of role and area creates a collection of rights.
Security Rights also include the following components:
-
Allowed Statuses: This field displays the list of statuses that are available to operator when they access records. A System Administrator specifies the allowed statuses for a role within an area. When this list is populated, the role may only update the records that are in one of the listed statuses. If a record has a status that is not in the list, the role will not be able to modify it. However, when the role updates records, the statuses that are available for selection are not limited to the list. If no statuses are listed, the role may modify records in any status.
-
Allowed Categories: This field displays the list of categories that are available to the operator when they access category data. A System Administrator specifies the allowed categories for a role within an area. When this list is populated, only the listed categories are available for selection when the role creates a new record or updates a record in the Category field. If no categories are listed, all categories are available for the role within the area.
-
-
Settings: Settings are configurable security extensions such as an initial view, a format to display a list, or an approval check box. Settings are added for an area. The types of settings include number, string, Boolean, date/time, global list, manual list, record, and condition.
-
Security Folders: If Folder Entitlement is enabled in the system, a System Administrator must select the security folders that each security role can access. If a role is not granted rights to a specific folder, operators associated with that role will not be able to access records in that folder.
-
Roles: A role has a set of rights and settings assigned to it. Each operator is assigned a role or roles which, along with area, determine the access rights for the operator. Whenever the roles on an operator record are updated, the operator must log out and then log in for the changes to take effect.
Note The out-of-box system includes a default role for the Security area that cannot be deleted.
-
Data Policy records: The data policy records include an Area field used to specify the area associated with the table. An area needs to be associated with a Data Policy record in order to access the information from the table.
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to ovdoc-ITSM@hp.com.
Help Topic ID:
Product:
Topic Title:
Feedback: