LSPS documentation logo
LSPS Documentation
Reference

Security Rights

A security role given to a person allows the person to perform actions based on the assigned security rights.

The following security rights are available:

Security right Description
Binary:Add adding binary resources
Binary:Delete removing binary resources
Binary:Read reading binary resources
Debugger:Manage managing debugger–setting, activating, deactivating the debug mode, and adding, updating and removing breakpoints
Document:Read reading documents
Document:Submit editing and submitting documents
Exception:Read retrieving rollback information
Exception:Remove removing rollback info
Exception:Resend resending task data from the Exception Handling view
Expression:Evaluate evaluating expressions in runtime (in the Expression Evaluator)
Form:Preview running form previews (note that you need the Model:Manage right to be able to preview forms)
GoalState:Update changing states of goals
Lock:Manage acquiring or releasing data locks
Model:Delete deleting model instances
Model:Manage adding and uploading models to the repository and exporting uploaded models to archive files
Model:Read finding, reading, and updating models and GO-BPMN modules in the repository and reading resources (files) for a given model
ModelInstance:Create creating model instances
ModelInstance:Notify notifying model instance from a Web Service
ModelInstance:Read retrieving model instance related information
ModelInstance:Suspend suspending running model instances
ModelInstance:Terminate terminating running model instances
ModelInstance:Update_Model changing the model for running model instances
Person:Change_Own_Password changing own password
Person:Manage managing general information and associations to modeled roles of persons
Person:Read retrieving person related information
Report:Dashboard_Management enables the definition of common dashboard tabs
Report:Read_All reading all available reports (this right overrides the security setting defined for the report)
Report:Read_Own reading reports, which the user is entitled to
Role:Manage managing role
Role:Read reading roles (read-only access)
Schema:DropCreate availability of drop-create strategy for business objects
Schema:Update updating strategy of business objects
Schema:Validate validating schema of business objects
SecurityRole:Manage adding, renaming, and removing security roles to/from the persistent storage and assigning rights to security roles and acquiring a set of all rights
SecurityRole:Read retrieving security roles and associated users
Signal:Remove removing a signal from the model instance queue
Signal:Send sending signals to model instances
Testing:Allinternal security right; Do not assign this right to any users.
Todo:Delegate_All delegating any to-dos
Todo:Delegate_Own delegating to-dos of the particular person
Todo:Escalate_All escalating any to-dos
Todo:Escalate_Own escalating to-dos assigned to the particular user
Todo:Process getting, submitting and canceling a to-do
Todo:Read acquiring list of to-dos meeting the given criteria
Todo:Read_All reading all available to-dos (this right overrides the security setting defined for the to-do)
Todo:Read_Assignees displaying to-do assignees (in to-do details)
Todo:Read_Own reading to-dos, which the user is entitled to
Todo:Reassignreassigning to-dos
Todo:Reject rejecting to-dos
Todo:Undo_Reject cancelling to-do rejection
Variables:Update changing values of variables of the given context
Webservice:Invoke platform specific right
Webservice:Read monitoring of current Web Services