Use this page to specify the users and groups that are mapped to the security roles that are used with the job scheduler system application.
To view this page, click System Administration > Job scheduler > Security role to user/group mapping.
Different roles can have different security authorizations. Mapping users or groups to a role authorizes those users or groups to access applications defined by the role.
Enables the server to locate the users that you can define for a particular security role
Enables the server to locate the groups that you can define for a particular security role.
Use this tab to configure roles.
Maps specific capabilities to a user.
Role privileges give users and groups permission to run as specified. Select the check boxes to choose a role or a set of roles.
Specifies whether to map everyone to a specified role. When you map everyone to a role, anyone can access the resources that are protected by this role and, essentially, there is no security.
Specifies whether to map all of the authenticated users to a specified role. When you map all authenticated users to a specified role, all of the valid users in the current registry who have been authenticated can access resources that are protected by this role.
Lists the users that are mapped to the specified role within the job scheduler system application.
Lists the groups that are mapped to this specified role within the job scheduler system application.