Configure Security
Security is configured from within Workbench for Eclipse. If you have the proper authority, you can set up security from within the Data Privacy product.
To manage users, groups, and role mapping:
- From the Workbench for Eclipse Welcome window, click the Data Privacy icon.
Select Configure > Manage Security.
The first time you access security, you will be prompted for a user ID and password. The initial default user ID and default password is "cwsecadmin".
- Log in. The User Management view appears. The default user names, and any users who have been added since installation appear in the User Name list. There are several tabs at the bottom of the screen allowing you to select the different options.
- To add a new user, click Add. The Add Users dialog box appears. In the User Name field, type a domain\user ID. Optionally, enter a password for this user. (See Manage-Security for details on when a password is required.) Then click OK. The user is now added to the list. Repeat this step until you have added all of the desired users.
- To modify the default cwsecadmin user, select it and click Edit. Make your changes and click OK.
- To delete a user, select the user and click Remove.
- Select the Group Management tab. The Group Management view appears. The default groups, and any groups that have been added since installation, appear in the Group Name list.
- To add a new group, click Add. The Add Groups dialog box appears. In the Group Name field, type a group name and move the users you want to add to the group from the Available Users column to the Selected Users column. Then click OK.
- To modify a group, select the group and click Edit. The group name cannot be changed, but you can add users to, or delete users from, the group. Make your changes and click OK.
- To delete a group, select the group and click Remove.
- Select the Role Mapping tab. The Role Mapping view appears. The default mapped roles, and any roles that have been added since installation, appear in the Name list.
- To map a group to a role, select one of the Application Roles from the list and click Map Groups. The Group Selection dialog box appears. Select a group name from the list of groups. After you have selected your group, click OK. That group will appear in the role mapping list for that role. Repeat this step until you have mapped all of the desired roles.
- To map a user to a role, select one of the Application Roles from the list and click Map Users. The User Selection dialog box appears. Select a user name from the list of available users. After you have selected your user, click OK. That user will appear in the role mapping list for that role. Repeat this step until you have mapped all of the desired roles. For a description of the Data Privacy roles, see Manage-Security.
To delete a user or group mapping, select the user or group and click Remove.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*