Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Configuration Management security
Configuration Management security areas
The security areas for Configuration Management are Configuration Item and Configuration Management Configuration. These areas contain the default security rights and settings for the Configuration Management module. The security right settings will be inherited by any new roles created in an area when no other settings are specified for that security role.
These security areas are used to set permissions to operators to provide access to particular area of Configuration Management. The following table lists the areas and the relevant Configuration Management menu items the operators can access.
Area |
System Navigator menu items for this area |
---|---|
Configuration Item | This area contains the default security rights and settings for Configuration Item. The rights will be copied to new roles created for this area. However, the settings will only be inherited if there are no settings specified on the Role. |
Configuration Management Configuration |
This area contains the default security rights and settings for Configuration Management configuration. The rights will be copied to new roles created for this area. However, the settings will only be inherited if there are no settings specified on the Role. Note When you set the security rights for a security role in the Configuration Management Configuration area:
|
Default rights
The default rights defined in areas will be inherited when you create new security roles. The following table shows the out-of-box default rights defined in the Configuration Item and Configuration Management Configuration areas.
Area Name | View | New | Update | Delete/Close | Expert | Admin |
---|---|---|---|---|---|---|
Configuration Item | TRUE | FALSE | Never | Never | FALSE | FALSE |
Configuration Management Configuration | FALSE | FALSE | FALSE | FALSE |
Default settings
The default settings defined in areas will be inherited when you create new security roles. In an out-of-box system, none of the default settings is checked or set in the Configuration Item and Configuration Management Configuration areas.
Configuration Management security roles and settings
The out-of-box security roles for the Configuration Management module include the following:
- Configuration Administrator
- Configuration Auditor
Out-of-box role rights
Based on the mapping rules, the rights and settings in previous security profiles are mapped to the rights and settings in the Configuration Management area specified in the corresponding security roles. See the table below for the out-of-box security rights in the Configuration Item and Configuration Management Configuration areas. This table only lists the new security roles that have different settings with the default rights.
Area Name | Role Name | View | New | Update | Delete/Close | Modify Template | Expert | Admin |
---|---|---|---|---|---|---|---|---|
Configuration Item | Configuration Administrator | TRUE | TRUE | Always | Never | FALSE | FALSE | FALSE |
Configuration Auditor | TRUE | TRUE | Always | Never | FALSE | FALSE | FALSE | |
Configuration Management Configuration | Configuration Administrator | FALSE | FALSE | Never | Never | FALSE | FALSE | FALSE |
Configuration Auditor | FALSE | FALSE | Never | Never | FALSE | FALSE | FALSE |
Configuration Management security options
Security options are available to users with the SysAdmin and ICMAdmin capability words. Security options are independent of the options selected in the Configuration Management security roles.
Field | Definition |
---|---|
Add | Add component records. |
Update | Update component records. |
Delete | Delete component records. |
Enables the print option for the user or group. | |
Fill | Enables the Fill function for the user or group. |
Find | Enables the Find function for the user or group. |
Mass Delete | Select a group of configuration records and delete them. |
Change Devtype | Change the CI type of an asset. |
Mass Update | Select a group of configuration records and modify fields in those records. |
Open Incident | Open an incident record from within Incident Management. |
Request Change | Open a change request in Change Management from within Configuration Management. |
Query Window | Run structured queries in Configuration Management. |
Export | Export component records to an external file. |
Count Records | Count the records in a record list. |
Views | View alternate forms in Configuration Management and additional information, such as Baseline version queries. |
The following options are available only when selected.
Field | Definition |
---|---|
Allow Inefficient Queries | Execute an incomplete or partially keyed query. This option is overridden if you select Skip Inefficient Query Warning. |
Skip Inefficient Query Warning | Disable the message warning the user that a non-keyed query will be slow. If you choose this option, you will override Allow Inefficient Queries. |