Map security role to users / groups

Use this page to specify the users and groups that are mapped to the security roles that are used with the job scheduler system application.

To view this page, click System Administration > Job scheduler > Security role to user/group mapping.

Different roles can have different security authorizations. Mapping users or groups to a role authorizes those users or groups to access applications defined by the role.

Look up users

Enables the server to locate the users that you can define for a particular security role

  1. Select the check box beside the role.
  2. Click Look up users
  3. Complete the Limit and the Search string fields.
The Limit field contains the number of entries that the search function returns. The Search string field contains the search pattern used for searching entries. For example, bob* searches all users or groups starting with bob. A limit of zero returns all the entries that match the pattern. Use this value only when a small number of users or groups match this pattern in the registry. If the registry contains more entries that match the pattern than requested, a message appears in the console to indicate that there are more entries in the registry. You can either increase the limit or refine the search pattern to retrieve all the entries.
Look up groups

Enables the server to locate the groups that you can define for a particular security role.

  1. Select the check box beside the role
  2. Click Look up groups.
  3. Complete the Limit and the Search string fields.
The Limit field contains the number of entries that the search function returns. The Search string field contains the search pattern used for searching entries. For example, bob* searches all users or groups starting with bob. A limit of zero returns all the entries that match the pattern. Use this value only when a small number of users or groups match this pattern in the registry. If the registry contains more entries that match the pattern than requested, a message appears in the console to indicate that there are more entries in the registry. You can either increase the limit or refine the search pattern to get all the entries.
Configuration tab

Use this tab to configure roles.

Role

Maps specific capabilities to a user.

Role privileges give users and groups permission to run as specified. Select the check boxes to choose a role or a set of roles.

  1. Click Look up users to map users to the roles that you have selected.
  2. Click Look up groups to map groups to the selected roles.
Use the check boxes to map roles to EVERYONE or ALL AUTHENTICATED special subject. For example, you might map the user Joe to the lradmin role, which enables user Joe to perform all of the tasks associated with the lradmin role. The authorization policy is only enforced when global security is enabled.
Everyone

Specifies whether to map everyone to a specified role. When you map everyone to a role, anyone can access the resources that are protected by this role and, essentially, there is no security.

All authenticated

Specifies whether to map all of the authenticated users to a specified role. When you map all authenticated users to a specified role, all of the valid users in the current registry who have been authenticated can access resources that are protected by this role.

Mapped users

Lists the users that are mapped to the specified role within the job scheduler system application.

Mapped groups

Lists the groups that are mapped to this specified role within the job scheduler system application.




WebSphere Extended Deployment information center (online)

Related information
Custom property collection
Custom property settings
Job scheduler configuration
WebSphere grid endpoints

bgs_security