Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Problem Management Security
The topics in this section explain the Problem Management security roles, security areas, and rights.
Problem Management Security Areas
User Role: System Administrator
The security areas for Problem Management are Problem, Problem Task, and Problem Management Configuration. These areas contain the default security rights and settings for Interactions in the Problem Management module. The security rights settings will be inherited by the new roles created in an area when no settings are specified in the security role.
Area |
System navigator menu items for this area |
---|---|
Problem |
This area contains the default security rights and settings for Problem. The rights will be copied to new roles created for this area. However, the settings will only be inherited if there are no settings specified on the Role. |
Problem Tasks |
This area contains the default security rights and settings for Problem Tasks. The rights will be copied to new roles created for this area. However, the settings will only be inherited if there are no settings specified on the Role. |
Problem Management Configuration |
This area contains the default security rights and settings for Problem Management Configuration. The rights will be copied to new roles created for this area. However, the settings will only be inherited if there are no settings specified on the Role. Note When you set the security rights for a security role in the Problem Management Configuration area:
|
Default rights
When you create new security roles, they inherit the default rights that are defined in the security area. The following table describes the out-of-box rights that are defined in the Problem, Problem Tasks, and Problem Management Configuration areas.
Area Name | View | New | Update | Delete/Close | Expert | Admin |
---|---|---|---|---|---|---|
Problem | TRUE | FALSE | Never | Never | FALSE | FALSE |
Problem Tasks | TRUE | FALSE | Never | Never | FALSE | FALSE |
Problem Management Configuration | FALSE | FALSE | Never | Never | FALSE | FALSE |
Default settings
The default settings defined in areas will be inherited when you create new security roles. In an out-of-box system, none of the default settings is checked or set in the Problem, Problem Tasks, and Problem Management Configuration areas.
Problem Management security roles and settings
The out-of-box security roles for Problem Management module include the following:
- Problem process owner
- Problem coordinator
- Problem analyst
- Problem task assignee
- Reviewer
Tip If you have upgraded from a previous version of Problem Management, which is not Process Designer based, see Problem Management security profiles mappings for more information about the mappings between the legacy Problem Management profiles and the current Process Designer security roles.
Out-of-box role rights
Based on the mapping rules, the rights and settings in previous security profiles are mapped to the rights and settings in the Problem area specified in the corresponding security roles. See the table below for the out-of-box security rights in the Problem, Problem Tasks, and Problem Management Configuration areas. This table only lists the new security roles that have different settings with the default rights.
Area Name | Role Name | View | New | Update | Delete/Close | Modify Template | Expert | Admin |
---|---|---|---|---|---|---|---|---|
Problem | problem process owner | TRUE | TRUE | Always | Always | TRUE | TRUE | TRUE |
system administrator | TRUE | TRUE | Always | Always | TRUE | TRUE | TRUE | |
Problem Tasks | problem process owner | TRUE | TRUE | Always | Always | TRUE | TRUE | TRUE |
problem task assignee | TRUE | FALSE | When assigned to workgroup | When assigned to workgroup | FALSE | FALSE | FALSE | |
system administrator | TRUE | TRUE | Always | Always | TRUE | TRUE | TRUE | |
Problem Management Configuration | problem manager | TRUE | TRUE | Always | Always | FALSE | FALSE | FALSE |
problem process owner | TRUE | FALSE | Never | Never | FALSE | FALSE | FALSE | |
system administrator | TRUE | TRUE | Always | Always | TRUE | TRUE | TRUE |