Set Permissions for Presentation Layer Objects
You can apply access control to restrict which individual users or application roles (groups) can access particular presentation layer objects.
For example, you can provide read-only access to a set of presentation tables for a particular application role, read-write access for a second application role, and no access for a third application role.
You can also use the Identity Manager to set up privileges and permissions. The Identity Manager is useful for setting permissions for individual application roles to many objects at once, unlike permissions in the Presentation layer, which you can only set for one object at a time. See Set Up Object Permissions and Apply Data Access Security to Repository Objects.
You can control what level of privilege is granted by default to the AuthenticatedUser
application role, which is the default application role associated with new repository objects. To do this, set the DEFAULT_PRIVILEGES
parameter in the NQSConfig.INI
file.
To set permissions for presentation layer objects:
Generate a Permission Report for Presentation Layer Objects
You can generate a permission report for individual presentation layer objects to see a summary of how permissions have been applied for that object.
The Permission Report displays the name and a description of the presentation object, along with a list of users/application roles and their permissions.
- In the Administration Tool, open a repository in online or offline mode.
- In the Presentation layer, right-click an object and select Permission Report.
Sort Columns in the Permissions Dialog
There are six ways that you can sort the types and User/Application Role names in the Permissions dialog.
To change the sort, click the heading of the first or second column. The first column has no heading and contains an icon that represents the type of user or application role. The second column contains the name of the User/Application Role object.
You can't sort on the columns for individual object permissions such as Read, and Read/Write.
There are three ways to sort by type, and two ways to sort the list of user and application role names. This results in a total of six possible sort results (3 x 2 = 6). The following list shows the sort results available by clicking the type column:
-
AuthenticatedUser, Application Roles, Users, ascending by name of type
-
Users, Application Roles, AuthenticatedUser, descending by name of type
-
Type column is in no particular order. The Type value is ignored, as all names in User/Application Role column are sorted in ascending order by value in User/Application Role column.
The following list shows the sort results available by clicking the User/Application Role column:
-
Ascending within the type
-
Descending within the type