Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Change Management security roles and settings
User Role: System Administrator
The out-of-box security roles for Change Management include the following:
- change advisory board (CAB)
-
change analyst change
- change analyst tasks
-
change approver
- change coordinator
- change coordinator change
- change coordinator tasks
- change domain expert (CDE)
-
change implementer
- change manager
- change owner
- change requestor
If you have upgraded from a previous version of Change Management, which is not Process Designer based, see the following table for a mapping of the Change Management profiles to the security roles.
Change profile | Security role |
---|---|
DEFAULT | default |
SD agent/manager | change requestor |
change analyst change | change owner |
change analyst tasks | change owner |
change approver | change advisory board (CAB) |
change coordinator change | change coordinator |
change coordinator tasks | change coordinator |
change manager | change manager |
emergency group | emergency CAB |
Initiator | change requestor |
problem manager | change requestor |
Sysadmin | system administrator |
In many cases, change profile rights used in versions earlier than 9.40 have been merged into much fewer security rights. For example, the Expert right represents several change profile rights. The Process Designer Change Management workflows reference security roles; after upgrade security roles that were converted from change profiles are used if they exist with the same name. If a workflow uses a security role that was not converted from a change profile, the system assigns default rights to the security role. It is important to inspect the security roles and modify them as appropriate for use in any of the Process Designer workflows.
The following table outlines the mapping between legacy change profile settings and the security role rights and settings.
Change profile settings field names |
Security roles settings field names |
---|---|
Copy and open |
New |
New |
|
Open |
|
Alternate views |
View |
Can count records |
|
Can notify |
|
Clear |
|
fill |
|
find |
|
irquery |
|
Show parent |
|
Tasks |
|
View |
|
Alerts |
Expert |
apprdism |
|
Can mass approve |
|
Complex Mass Update |
|
Duplicates |
|
Expert Search |
|
List Pages |
|
Template Mass Update |
|
Update when closed |
|
Change category |
Admin |
Change phase |
|
Can override approvals |
|
Allowed categories |
Allowed categories |
Allowed status |
Allowed Status |
Append Query |
Append Query |
Approval Groups |
approver.of in $G.myGroups |
Area |
Area |
Can access approvals |
Can Approve |
Can Delegate Approvals |
Can Delegate Approvals |
Change Manage Format |
Change Manage Format |
Close |
Delete/Close |
Default Change Category |
Default Category |
Default Task Category |
Default Task Category |
Inefficient Query |
Allow Inefficient Query |
Initial Change View |
Initial Change View |
Initial Format |
Initial Format |
Initial Task View |
Initial Task View |
Manager Group |
member.of in $G.myGroups |
Modify Template |
Modify Template |
Name |
Role |
QBE Format |
List Format |
Reopen |
Reopen |
Skip Warning |
Skip Inefficient Query Warning |
Task Manage Format |
Task Manage Format |
Update |
Update |
Rights and settings
To view the rights and settings that are defined for out-of-box Change Management security roles, follow these steps:
- Navigate to System Administration > Security > Roles.
- In the Name field, select a Change Management security role.
- Click Search.
-
Double-click a security area to open the Rights form.
This form lists the rights and settings of the security role for the selected security area.
-
View the Rights and Settings sections in the form.
The following table describes possible rights for Change Management security areas.
Security role rights Description New Can create new records in this area View Can view records in this area. Expert Has Expert rights in this area
Admin Has Admin rights in this area
Modify Template Can modify template records in this area Update Can update records in this area Delete/Close Can delete or close records in this area Allowed Categories Specifies the categories in this area that users with this role can select Allowed Statuses Specifies the status values in this area that users with this role can select The following is a list of settings available for Change Management security areas.
- Allow Inefficient Query: When this option is true, users with this role can run incomplete (inefficient) queries in this area, but receive a warning message. The Skip Inefficient Query Warning option overrides this setting. If not selected, users with this role cannot run inefficient queries in this area.
- Skip Inefficient Query Warning: Turns off inefficient query warnings for this area. This option overrides the Allow Inefficient Query option.
- Can Approve: Users with this role can approve records in this area.
- Can Delegate Approvals: Users with this role can delegate their own approvals in this area to another user.
- Reopen: Users with this role can reopen records in this area.
- Change Manage Format: The name of the form to display as the default change queue form. If left blank, sc.manage.chm is used.
- Default Category: Unused
- Default Task Category: Unused
- Initial Change View: Unused. Service Manager automatically saves the Change view that users with the role opened last time.
- Initial Task View: Unused. Service Manager automatically opens the Change Task view that users with this role opened last time.
- Initial Format: The initial format that is used when users with this role search change records. If left blank, cm3r.search is used.
- List Format: Also known as QBE Format. This is the QBE form to use when displaying records to users with this role. If left blank, cm3r.qbe is used.
- Task Manage Format: The name of the form to display as the default task queue form. If left blank, sc.manage.cmt is used.
- Append Query: This field stores an expression to append to all queries in this area run by users with this role. This expression restricts the records that the user with this security role can see, by appending (adding on) this query to everything the user does in this module. You must use the field name from the dbdict in the expression. For example, you can enter priority.code=”3” so that users with this security role can only see Priority 3 records.
-
View the Security Folders section.
This section specifies security folders that are accessible to this Role for records of this area. For more information, see Add folder permissions to a security role.
The out-of-box security folders available in Service Manager are DEFAULT and advantage. You can also create security folders to meet your business needs. By default, all security folders are assigned to a new security role created. Once a role is created and rights are configured, you can modify the security rights for a role within an area.
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to ovdoc-ITSM@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: