Redwood Documentation

Product Documentation

 

›Required Privileges

RunMyJobsSecurity

Roles and Users

  • Authorization
  • Partitions
  • Managing Users and Roles

Privileges

  • Privileges
  • Granted System Privileges
  • Object Security
  • Object Privileges
  • Granting and Revoking System Privileges
  • Granting and Revoking Object Privileges
  • System Privileges
  • Privileges
  • System Privileges

Required Privileges

  • Privileges Required for Objects
  • Ad Hoc Alert Sources
  • Alert Source Actions
  • Applications
  • Audit Rules
  • Audit Trail
  • SAP BAE connectors
  • Credential Protocols
  • Credentials
  • Datum Definitions
  • Documents
  • Alert Escalations
  • Event Definitions
  • Export Rule Sets
  • Export Processes
  • Formats
  • Email Alert Gateways
  • Housekeeping Dashbaord
  • Import Rule Definitions
  • Import Rule Sets
  • Import Sources
  • Imports
  • Chains
  • Process Alert Sources
  • Process Definitions
  • Definition Types (JobDefinitionsTypes)
  • Processes
  • Libraries
  • Process Locks
  • Monitoring Dashbaord
  • Monitor Alert Sources
  • Monitor Nodes
  • Operator Messages
  • Oracle Applications Systems
  • OHI Systems
  • Partitions
  • PeopleSoft Systems
  • Period Functions
  • Process Monitor Definitions
  • Process Monitors
  • Process Server Alert Sources
  • Process Servers
  • Query Filters
  • Queue Alert Source
  • Queues
  • R2W Catalogs
  • Registry Entries
  • Remote Systems
  • Reports
  • Resources
  • Roles
  • SAP Systems
  • Services
  • Shell
  • Subject Role Grant Expanded
  • Subjects
  • Submit Forms
  • Submit Frames
  • Table Definitions
  • Tables
  • Tabs and Links
  • Time Windows
  • Time Zones
  • Triggers
  • Users
  • User Messages
  • Visualization Alerts
  • Visualization Process Server Queues
← SAP BAE connectorsCredentials →

Privileges Required to use Credential Protocols

To use Credential Protocols, you need one of the following:

  • scheduler-administrator or redwood-administrator role
  • system or partition-level permissions
  • object-specific privileges

Using Credential Protocols

The following privilege ranks are available on Credential Protocols:

  • Create - allows you to create a Credential Protocol on the level the privilege was granted (system, partition), you have no further privileges through this rank, you automatically get All privilege rank on Credential Protocols you create.
  • View - allows you to view a Credential Protocol on the level the privilege was granted (system, partition), you have no further privileges through this rank.
  • Edit - allows you to create, view, and edit a Credential Protocol on the level the privilege was granted (system, partition).
  • Delete - allows you to create, view, and delete a Credential Protocol on the level the privilege was granted (system, partition).
  • All - full control over a Credential Protocol on the level the privilege was granted (system, partition).

You also require View privileges on the partition of the Credential Protocol, usually GLOBAL.

Credential Protocols can reference the following objects, you need at least View privileges on these objects and their partition(s) when you want to edit a Credential Protocols that references them:

  • Application.

Built-in Roles

  • The scheduler-administrator or redwood-administrator built-in role provides full control over Credential Protocols.
  • The scheduler-viewer built-in role provides read-only access to Credential Protocols.

Creating Credential Protocols

  • Create - allows you to create Credential Protocols on the level the privilege was granted (system, partition), you have no further privileges through this rank, you automatically get All privilege rank on Credential Protocols you create.
  • View - allows you to view Credential Protocols on the level the privilege was granted (system, partition, object), you have no further privileges through this rank.
  • Edit - allows you to create, view and edit all Credential Protocols on the level the privilege was granted (system, partition, object).
  • Delete - allows you to create, view, and delete all Credential Protocols on the level the privilege was granted (system, partition, object).
  • All - full control over all Credential Protocols on the level the privilege was granted (system, partition, object).
note

You can create Credential Protocols, however, you will only be able to use them with specially crafted definition types.

Editing Credential Protocols

  • Edit - privilege rank on Credential Protocol, or on Credential Protocols partition or system-wide.
  • All - privilege rank on Credential Protocol, or on Credential Protocols partition or system-wide.

Deleting Credential Protocols

  • Delete privilege on the Credential Protocol, or on a Credential Protocol on the level the privilege was granted (system, partition, object).
  • All Credential Protocol, or on a Credential Protocol on the level the privilege was granted (system, partition, object).
warning

Do not attempt to delete built-in Credential Protocols.

See Also

  • Privileges Required to use Applications
  • Privileges Required to use Objects
← SAP BAE connectorsCredentials →
  • Using Credential Protocols
  • Built-in Roles
  • Creating Credential Protocols
  • Editing Credential Protocols
  • Deleting Credential Protocols
  • See Also
Docs
Getting StartedInstallationFinance InstallationConcepts
TroubleshootingArchiving
Learn and Connect
Support Portal
BlogEventsResources
ISO/ IEC 27001 Information Security Management
Automate to be human

2023 All Rights Reserved |

Terms of Service | Policies | Cookies | Glossary | Third-party Software | Contact | Copyright | Impressum |