This documentation supports the 20.02 version of BMC CMDB.To view an earlier version, select the version from the Product version menu.

Providing users with permissions to access the CMDB Portal by using groups and roles


As an administrator, you can assign users to groups on the AR server to restrict users' access to specific features of CMDB Portal (new CMDB UI). The groups that have restricted access to the CMDB Portal are created automatically during the installation of CMDB and ITSM. You only need to assign users to these groups.


Before you begin

  • If you are the first administrator to log in, you must log in as an administrator and leave the Password field empty (BMC AR System user names are case-sensitive)
  • During initial installation, the Demo user is installed as administrator without a required password. To keep BMC AR System secure, add a password for this user as soon as possible.

To provide users with access to CMDB Portal using groups

You can provide users with access to BMC CMDB by adding them to a group which has the appropriate access.

  1. Open the Users form in the Mid Tierfrom the following location:
    AR System Administration > AR System Administration Console > Application > Users / Groups / Roles > Users.
    The form opens in search mode.
    User permissions_GIF.gif 
  2. Perform one of the following steps:
    • To create a new user, click New request.
      image2018-7-20_10-31-47.png
    • To find existing users, enter search criteria in the User Name or any other field and click Search
  3. Select a user that you want to add to a group.
    To find the correct group, open the Groups form and perform a search:
    AR System Administration > AR System Administration Console > Application > Users / Groups / Roles > Groups.
  4. In the Group List, select the appropriate group based on this table.

Permissions model to provide access to CMDB Portal

Based on the groups users are assigned to, the features they can access varies. The AR server groups referenced in this table are created automatically when you install CMDB and ITSM. 

Type of user and their requirements

Access level in CMDB Portal

Group to which you can assign the user

Administrator

Requires all features of CMDB Portal.

All areas of BMC CMDB

Administrator

CMDB configuration manager

Requires all features of CMDB Portal except those which are related to Atrium Integrator.

Create jobs, edits jobs, creates rules, uses the dashboard, and so on.

All of the CMDB Portal except the following:

  • Cannot edit CIs.
  • Cannot create or edit classes.
  • Cannot access Atrium Integrator via the data flow diagram or Atrium Integrator job console.

RE Definition Author

CMDB data publisher

Performs asset related work, creates and edits CIs and other activities related to service modeling.

Requires access to the Search and the Explorer in CMDB Portal and also needs to be able to edit CIs in the Explorer.

Can access the Search, Explorer, and can also edit all CIs in Explorer.

Asset Admin

CMDB user

Perform asset related work.

Needs to only access the Search and the Explorer in CMDB Portal. Does not need to edit CIs in the Explorer and cannot create or edit CIs.


Can access Search and Explorer. Can only edit non-asset CIs. Cannot edit CIs in the asset dataset or the golden dataset.

Task Manager, Task User, Task Viewer, Asset Viewer, Asset User, Asset Config, Infrastructure Change Master, Infrastructure Change User, Infrastructure Change Submit, Infrastructure Change Viewer, Infrastructure Change Config, Release Master, Release User, Release Viewer, Activity User, Activity Viewer, Release Config, Activity Config, Incident Master, Incident User, Incident Viewer, Incident Config, Problem Master, Problem User, or Problem Viewer

Important

  • Users who have permissions to create and edit CIs must also have CI level permissions to be able to edit CIs.
  • Certain features may not be accessible to a user from the CMDB UI because of the access level that the user has as mentioned in the preceding table. But, if the user has permissions to the AR System forms, the same features can be accessed by using the AR System APIs.