This documentation supports the 21.05 version of Action Request System.
To view an earlier version, select the version from the Product version menu.

Special groups in AR System

AR System  reserves the following group IDs for special group definitions. The following table describes the access privileges for each of these groups.


Special groups in Remedy AR System

Group

ID

Type

Description

Public

0

Implicit

Provides general access. Access granted to this group is granted to all users. Every user who logs in to AR System is automatically a member of the Public group. This includes registered users (that is, listed in the User form) and guest users. 

Administrator

1

Explicit

Defines users who have full and unlimited access to AR System . Administrators, members of this group, can view any object or field in a browser and can create a request in any form. Administrators can view, create, modify, and delete any server object in Remedy Administrator. A user must have a fixed license or this group assignment is ignored.

Customize

2

Explicit

Grants users the ability to customize their form view layout in the mid tier. Use this group with caution.

Submitter

3

Implicit

Provides field access to the user whose login name is in the Submitter field (field ID 2) for a particular request. The user who creates a request is usually automatically belongs to the Submitter group for that requests. For more information, see Controlling access by using implicit groups: Row-level security. See Enabling submitters to modify requests, to enable a special server Submitter mode that allows the user who submitted a request to modify it without having a write license.

Assignee

4

Implicit

Provides field access to the user whose name is in the Assignee field (field ID 4) for a particular request. The user whose name is in the Assignee field automatically belongs to the Assignee group. For more information, see Controlling access by using implicit groups: Row-level security.

Sub Administrator

5

Explicit

Provides administrative access to selected server objects. Subadministrators, members of this group, can be granted administrative access to objects that have the Subadministrator Permissions property. With administrative access, a subadministrator has the same access as an administrator for that object. See Creating a Subadministrator security role. A user must have a fixed license or this group assignment is ignored.

Assignee Group

7

Implicit

Provides field access to the user who is a member of one of the groups listed in the Assignee Group field (field ID 112) for a request. A user automatically belongs to the Assignee Group group for requests in which the Assignee Group field exists and contains the name or ID of a group to which the user belongs, the name or ID of a role that maps to a group to which the user belongs, or the user's name. For more information, see Controlling access by using implicit groups: Row-level security and Form, active link guide, and application permissions.

Do not confuse this group with the Assignee group, which gives permission to the individual user named in the Assignee field. 

Struct Admin

8*

Explicit

Struct Admin members can create, modify, and delete AR server objects, but have no access to data or to administrative functions unless provided by other groups in the user's group list with the expectation to modify the configuration information, such as logging settings. For more information about Struct Admin permissions, see Struct Admin group permissions

The assigned user must have a fixed license or this group assignment is ignored.

Struct Subadmin

9*

Explicit

Struct Subadmin members can modify AR server objects subject to the same rules that govern Sub Administrator group members. If the object's Administrator group list contains a group in which the Struct Subadmin user is a member, the user has access. Struct Subadmin members have no access to data or to administrative functions unless provided by other groups in the user's group list. The assigned user must have a fixed license or this group assignment is ignored.

* This Group ID assignment might present a conflict with custom type assignments.

In addition to the groups listed in the previous table, groups with IDs in the range of 60000 to 60999 are reserved for dynamic groups.

Was this page helpful? Yes No Submitting... Thank you

Comments