JAMS 6.x Help
JAMS Security: Setting Access Control Lists

Access Control Lists are used to define access restrictions for a variety of features within JAMS.

An ACL is a list of Access Control Entries (ACEs). Each ACE includes one or more identifier along with the type of user access. For example, when a user attempts to perform a function, JAMS starts at the top of the ACL listing to determine if he/she can perform that particular function by checking the identifiers specified in each ACE against those held by the user. When a match is found the user is granted access specified on the ACE. If the end of the ACL list is reached without a match, no access is granted.

 

Configure Access Control

In JAMS V6.5.18 and newer, a Job called SetJAMSAccessControl is available in the JAMS Folder. This Job configures JAMS Access Control to match the best practices outlined below. An overview of the SetJAMSAccessControl Job is available here.

Best Practices

Typical implementations of JAMS Security Settings result in the creation of four groups: Admin, developers, submitters, and inquirers. The following table outlines best practice permissions given to each group. Admins are not listed, as they are the GrantBypassGroup in the Configuration.

 

Access control Line Item

DEV

SUB

INQ

Alert Definitions
Add X
Change X
Delete X
Inquire X X X
Configuration
Execute
Inquire
Dates
Add X
Change X
Delete X
Inquire X X X
Date Types
Add X
Change X
Delete X
Inquire X X X
Folder Definitions
Add X
Change X
Control
Delete X
Inquire X X X
History Inquiry
Execute X X X
Job Definitions
Add X
Change X
Delete X
Inquire X X X
Menu Definitions
Add X
Change X
Delete X
Inquire X X X
Monitor
Abort X X
Execute X X
Manage X X
See All Jobs X X X
See Own Jobs X X X
Named Time Definitions
Add X
Change X
Delete X
Inquire X X X
Manage X
Queues
Add X
Change X
Delete X
Inquire X X X
Reporting
Add X
Change X
Delete X
Execute X X X
Inquire X X X
Resource Definitions
Add X
Change X
Delete X
Inquire X X X
Manage X
Security
Execute
Inquire
Server
Execute X X X
Setup Definitions
Add X
Change X
Delete X
Inquire X X X
Trigger Definitions
Add X
Change X
Delete X
Inquire X X X
Manage X
Reset X X
Users
Add X
Change X
Delete X
Inquire X X X
Variable Definitions
Add X
Change X
Control
Delete X
Inquire X X X

 

The access capabilities (access types) for each security function are detailed in the following sections.

Alert Definitions

Configuration

Dates

Date Types

Folder Definitions

Note: Each Folder Definition has its own access control information. This ACL can be viewed and/or modified from the Folder Definitions > Security tab.

Note: In order to modify, delete or view a Folder Definition you must have Change, Delete or Inquire access to Folder definitions as well as Change, Delete or Inquire access to the specific Folder definition which you want to modify.

History Inquiry

History Inquiry has only one security option, Execute. You can either grant or deny access to view History entries.

Job Definitions

Note: Job Definitions can also be controlled by the Access Control List within each Folder definition. To create a Job you must have Add access to Job Definitions plus Job Add access to the Folder to which the Job belongs. Similarly, to modify, delete or inquire into a Job definition you must have the corresponding Job Change, Job Delete or Job Inquire access rights for the Folder to which the Job belongs.

 Menu Definitions

Monitor

Note: Monitor capabilities are also controlled using Folder Definitions. For example, you could grant someone See All Jobs access to the Job Monitor giving them the ability to monitor all batch Jobs. Then each Folder definition could define whether or not the user can manage or abort any Jobs located within that Folder.

Named Time Definitions

Queues

Reporting

Resource Definitions

Security

Server

The Server ACL contains only one security option.

Setup Definitions

Setup Definitions are also controlled by the Access Control List for each Folder definition. To create a Setup you must have Add access for all Setup Definitions and Submit access to the Folder to which the Setup’s Job definition belongs, plus Define Setup access to the Folder to which the Setup definition belongs.

The Submit and Define Setup access rights are defined within each Folder definition.

Trigger Definitions

Users

Variable Definitions

Note: Each Variable has an individual ACL which is used to protect only that Variable.

See Also

 

 


Topic updated: 2/20/2017
©2017 MVP Systems Software, Inc. All Rights Reserved.

Send comments on this topic.