Redwood Documentation

Product Documentation

 

›Roles and Users

RunMyJobsSecurity

Roles and Users

  • Authorization
  • Partitions
  • Managing Users and Roles

Privileges

  • Privileges
  • Granted System Privileges
  • Object Security
  • Object Privileges
  • Granting and Revoking System Privileges
  • Granting and Revoking Object Privileges
  • System Privileges
  • Privileges
  • System Privileges

Required Privileges

  • Privileges Required for Objects
  • Ad Hoc Alert Sources
  • Alert Source Actions
  • Applications
  • Audit Rules
  • Audit Trail
  • SAP BAE connectors
  • Credential Protocols
  • Credentials
  • Datum Definitions
  • Documents
  • Alert Escalations
  • Event Definitions
  • Export Rule Sets
  • Export Processes
  • Formats
  • Email Alert Gateways
  • Housekeeping Dashbaord
  • Import Rule Definitions
  • Import Rule Sets
  • Import Sources
  • Imports
  • Chains
  • Process Alert Sources
  • Process Definitions
  • Definition Types (JobDefinitionsTypes)
  • Processes
  • Libraries
  • Process Locks
  • Monitoring Dashbaord
  • Monitor Alert Sources
  • Monitor Nodes
  • Operator Messages
  • Oracle Applications Systems
  • OHI Systems
  • Partitions
  • PeopleSoft Systems
  • Period Functions
  • Process Monitor Definitions
  • Process Monitors
  • Process Server Alert Sources
  • Process Servers
  • Query Filters
  • Queue Alert Source
  • Queues
  • R2W Catalogs
  • Registry Entries
  • Remote Systems
  • Reports
  • Resources
  • Roles
  • SAP Systems
  • Services
  • Shell
  • Subject Role Grant Expanded
  • Subjects
  • Submit Forms
  • Submit Frames
  • Table Definitions
  • Tables
  • Tabs and Links
  • Time Windows
  • Time Zones
  • Triggers
  • Users
  • User Messages
  • Visualization Alerts
  • Visualization Process Server Queues
Partitions →

Authorization

Redwood Server features a simplified security model based on built-in Redwood roles. Users and roles from external authentication systems are used to access the user interface, it is not possible to create users or roles inside Redwood Server. Basic privileges can be granted inside the authentication system, via the built-in roles; the process depends on the authentication system you are using. Fine-grained privileges can then be granted in the user interface to custom roles that you previously created in the external authentication system.

Finding Users

You can search for users using filters and the Search Users box on the Users tab. This box is known as the IntelliSearch box and located under your username on the top right-hand side of the user interface. Filters allow you to specify a list of objects with static criteria. IntelliSearch allows you to specify complex queries in a simple way using prefixes. Prefixes are used to specify which property you are searching in and have short as well as long syntaxes. For example, if you want to display all users with the term user in the comment, you would use the search criteria as follows:

c:PR1

You can search more than one property, as follows:

c:PR1 n:JV
note

No spaces should be entered before or after the colon (:).

See the Advanced Object Search for more information.

The following table illustrates the available prefixes for queues:

PrefixesDescription
n, namesearches the name property
c, commentsearches the documentation property
d, descriptionsearches the description property
a, applicationsearches the application property
cb, changedbefore(internal) search for users that changed before a certain ISO-8601 period

See Also

This chapter contains the following topics:

  1. Partitions.
  2. Storing External Credentials.
  3. Privileges.
  4. System Privileges.
  5. Granted System Privileges.
  6. Object Privileges.
  7. Granting and Revoking System Privileges.
  8. Granting and Revoking Object Privileges.
  9. Privileges Required to use objects.
Partitions →
  • Finding Users
  • See Also
Docs
Getting StartedInstallationFinance InstallationConcepts
TroubleshootingArchiving
Learn and Connect
Support Portal
BlogEventsResources
ISO/ IEC 27001 Information Security Management
Automate to be human

2023 All Rights Reserved |

Terms of Service | Policies | Cookies | Glossary | Third-party Software | Contact | Copyright | Impressum |