This documentation applies to the 8.1 version of Remedy Action Request System, which is in "End of Version Support."

To view the latest version, select the version from the Product version menu.

Special groups in BMC Remedy AR System

BMC Remedy AR System reserves the following group IDs for special group definitions. The following table describes the access privileges for each of these groups.


Special groups in BMC Remedy AR System

Group

ID

Type

Description

Public

0

Implicit

Provides general access. Access granted to this group is granted to all users. Every user who logs in to BMC Remedy AR System is automatically a member of the Public group. This includes registered users (that is, listed in the User form) and guest users. 

Administrator

1

Explicit

Defines users who have full and unlimited access to BMC Remedy AR System. Administrators, members of this group, can view any object or field in a browser and can create a request in any form. Administrators can view, create, modify, and delete any server object in Remedy Administrator. A user must have a fixed license or this group assignment is ignored.

Customize

2

Explicit

Grants users the ability to customize their form view layout in the mid tier. Use this group with caution.

Submitter

3

Implicit

Provides field access to the user whose login name is in the Submitter field (field ID 2) for a particular request. The user who creates a request is usually automatically belongs to the Submitter group for that requests. For more information, see Submitter and Assignee access. See Enabling submitters to modify requests, to enable a special server Submitter mode that allows the user who submitted a request to modify it without having a write license.

Assignee

4

Implicit

Provides field access to the user whose name is in the Assignee field (field ID 4) for a particular request. The user whose name is in the Assignee field automatically belongs to the Assignee group. For more information, see Submitter and Assignee access.

Sub Administrator

5

Explicit

Provides administrative access to selected server objects. Subadministrators, members of this group, can be granted administrative access to objects that have the Subadministrator Permissions property. With administrative access, a subadministrator has the same access as an administrator for that object. See Subadministrator security role. A user must have a fixed license or this group assignment is ignored.

Assignee Group

7

Implicit

Provides field access to the user who is a member of one of the groups listed in the Assignee Group field (field ID 112) for a request. A user automatically belongs to the Assignee Group group for requests in which the Assignee Group field exists and contains the name or ID of a group to which the user belongs, the name or ID of a role that maps to a group to which the user belongs, or the user's name. For more information, see Assignee Group access and Form, active link guide, and application permissions.

Note

Do not confuse this group with the Assignee group, which gives permission to the individual user named in the Assignee field.

Struct Admin

8 1

Explicit

Struct Admin members can create, modify, and delete AR server objects, but have no access to data or to administrative functions unless provided by other groups in the user's group list. 

Note

For more information about Struct Admin permissions, see Struct Admin group permissions

The assigned user must have a fixed license or this group assignment is ignored.

Struct Subadmin

9 1

Explicit

Struct Subadmin members can modify AR server objects subject to the same rules that govern Sub Administrator group members. If the object's Administrator group list contains a group in which the Struct Subadmin user is a member, the user has access. Struct Subadmin members have no access to data or to administrative functions unless provided by other groups in the user's group list. The assigned user must have a fixed license or this group assignment is ignored.

  1. This Group ID assignment might present a conflict with custom type assignments.

In addition to the groups listed in the previous table, groups with IDs in the range of 60000 to 60999 are reserved for dynamic groups.

This version of the documentation is no longer supported. However, the documentation is available for your convenience. You will not be able to leave comments.

Comments