Asset Management user roles and permissions
To access Asset Management, you need one of the following permissions:
- Asset admin—A user with Asset admin permission can create and modify an asset and perform all Asset Inventory functions. A user with this permission can also copy an existing asset and create a new asset.
- Asset user—A user with Asset user permission, who is part of a support group that has Created by, Managed by, or Supported by roles to an asset, can modify the asset and perform all the Asset Inventory functions, except creating an asset-to-asset relationship. Users with Asset user permission who are not part of these support groups can only view the asset information.
- Asset viewer—A user with the Asset viewer permission can only view the asset information.
Related topics
Mapping roles to permission groups
(BMC Helix ITSM documentation)
(BMC Helix ITSM documentation)
Providing users with permissions to access the CMDB Portal by using groups and roles
Providing users with permissions to access the CMDB Portal by using groups and roles
The following table describes the scope of the asset permissions:
Task | Asset admin | Asset user (is part of the support group that has a Supported by role to an asset) | Asset viewer |
---|---|---|---|
Create asset | ✅️ (Create asset by copying an existing asset) | ✅️ (Create an asset) | ❌️ |
Copy asset | ✅️ | ✅️ (With asset creator functional role) | ❌️ |
View asset | ✅️ | ✅️ | ✅️ |
Modify asset | ✅️ | ✅️ | ❌️ |
Add related Items | ✅️ | ✅️ | ❌️ |
Delete related Items | ✅️ | ✅️ | ❌️ |
View related Items | ✅️ | ✅️ | ✅️ |
Add related assets | ✅️ | ❌️ | ❌️ |
Delete related assets | ✅️ | ❌️ | ❌️ |
View related assets | ✅️ | ✅️ | ✅️ |
View contracts | ✅️ | ✅️ | ✅️ |
Add outages | ✅️ | ✅️ | ❌️ |
Delete outages | ✅️ | ✅️ | ❌️ |
View outages | ✅️ | ✅️ | ✅️ |
Add people relationships | ✅️ | ✅️ | ❌️ |
Delete people relationships | ✅️ | ✅️ | ❌️ |
View people relationships | ✅️ | ✅️ | ✅️ |
Add financial details | ✅️ | ✅️ | ❌️ |
Edit financial details | ✅️ | ✅️ | ❌️ |
View financial details | ✅️ | ✅️ | ❌️ |
To assign the Asset Automation Admin functional role to a user
- Log in to Mid Tier.
- In the Application Administration Console, click the Custom Configuration tab.
- From the Application Settings list, select Foundation > People > People, and click Open.
- On the People form, select the user to whom you want to assign the functional role.
- Select Login/Access Details > IS Personas.
- In the Login ID field, enter the login id of the user.
- Click Update Personas.
On the IS Personas form, enter the following details:
Field
Description
Application Name
Select com.bmc.dsm.asset-automation.
Persona
Select Asset Automation Admin.
- Click Add/Modify.
- Click Close and then click Save.
Instructions for classic interfaces
View instructions for Mid Tier
To access the various modules in Mid Tier, you need the following permissions and authorizations:
- Asset Management permissions
- Contract Management permission model
- Cost module permission model
Asset Management permissions
This table describes the Asset Management permissions for the following user roles.
Important
- Add licenses only for the features and number of users that correspond to your license entitlements. Your subscription or purchase determine your license entitlements.
- If you select the Application user license type as None, you get only Asset Inventory permissions. For information about these permissions, see Asset Inventory permissions.
Permissions | Description | Application user license type | Best practice |
---|---|---|---|
Asset Admin | Users with Asset Admin permissions can perform all of the Asset Inventory functions as well as the following Asset Management functions:
Important: This permission does not grant access to purchasing or receiving functions. A person with Asset Admin permissions does not need Asset User and Asset Viewer permissions. Users with Asset Admin permissions have full access to contracts and Software License Management (SWLM) features, which means they do not need any other Contract permissions unless they must create new Contract Types (this ability comes with Contract Admin permissions) or configure certain aspects of SWLM (this ability is given with Contract Config permissions). |
| We recommend that you grant these permissions only to users performing a Configuration Administrator role. |
Asset User | Users with Asset User permissions can perform the following Asset Management functions:
A user with Asset User permissions does not automatically get the equivalent permissions as the Contract User permissions group. If a user requires the ability to either modify license certificates or manage License jobs as part of SWLM, they must also be given Contract User permissions. |
| We recommend that you grant these permissions to users who are directly supporting specific CIs and who must update CI attributes. Users with the Asset User permission can also update relationships for the following Request types:
|
Asset Viewer | Users with Asset Viewer permissions have access to all of the Asset Inventory functions as well as the following Asset Management functions:
Important The Asset Viewer permission does not grant access to:
Asset Viewer permissions are granted automatically when any of the following permissions are assigned:
|
| We recommend that you grant the Asset Viewer permission to all Support personnel (that is, users who do not already have the Asset Admin or Asset User permissions). Having access to CI information is vital for most ITIL processes. |
Asset Config | Users with Asset Config permission have access to all of the Asset Inventory functions as well as the following Asset Management functions:
Important Users with Asset Config permissions do not need Contract Config permissions. |
| We recommend that you grant these permissions only to users who administer the Asset Inventory and Asset Management system (that is, to a user who acts as an Application Administrator). |
Purchasing User | Users with Purchasing User permissions can access the following functions within BMC Helix ITSM: Asset Management:
|
| We recommend that you limit the use of these permissions to users who perform the following roles in the Asset Management Purchasing feature:
|
Receiving User | Users with Receiving User permissions can access the Receiving console to receive CIs from the Purchasing system. |
| We recommend that you grant these permissions only to users who use the Asset Management Purchasing feature, such as Purchasing Agents. |
Contract Admin | Users with Contract Admin permissions can perform the following functions:
Important A user with Asset Admin permissions can do everything that a user with Contract Admin permissions can with the exception of creating new Contract Types. |
| We recommend that you grant these permissions to users who need full access to the Contract Management features, but who don't need the full Asset Management access given by the Asset Admin permissions group. |
Contract User | Users with Contract User permissions can perform the following functions:
|
| We recommend that you grant these permissions to users who need controlled access to create and modify contracts, but who do not require access to modify CI information. If a user also needs to modify CI information, also give that user Asset User permissions. |
Contract Viewer | Users with Contract Viewer permission can view all contracts from the Contract console. |
| We recommend that you grant these permissions to users who require view access to contracts. |
Contract Config | Typically, an application administrator requires this set of permissions. Users with Contract Config permission can perform the following functions:
Important: This permission does not grant access to the SAM console. If a user has Asset Config permission they do not need Contract Config permissions because the Asset Config permissions group can configure the same SWLM features that the Contract Config permissions can configure. |
| We recommend that you grant these permissions to users who must only configure Software License Management (SWLM) features. |
Contract Management permission model
Contract Management permission groups are defined as computed groups in the Group form. Each Contract Management permission group is mapped to an Asset permission group to support the deployable application functionality. To remove specific users from the computed group, remove the BMC Helix ITSM: Asset Management groups for each Contract permission group.
Cost module permission model
The cost module uses the following permissions:
- Cost Viewer — Can only view cost data
- Cost User — Can add costs
- Cost Manager — Can update and manage the charge-back process
Asset Management roles
The following table describes the several roles and their permissions that a user in Mid Tier can be associated with :
Role | Permission | Description |
---|---|---|
Asset Creator | Asset User | Asset user with an asset creator functional role can create an asset. |
Asset administrator |
| The asset administrator requires an overall view of the CIs for which their support groups are responsible. Some organizations refer to this role as asset manager or configuration administrator. |
Contract manager | Contract Admin | The contract manager is responsible for managing IT contracts. In some organizations, the contract manager also takes on the role of software asset manager. |
Financial manager | Cost Manager permission | The finance manager uses BMC Helix ITSM: Asset Management to review cost information and prepares periodic charge-back and cost-recovery reports. |
Purchasing agent | Purchasing User (needed only if you use the Purchasing module)
| The purchasing agent is in charge of the purchases in an organization. |
Software asset manager | Asset Admin | The software asset manager is responsible for optimizing software assets and for managing compliance with software license contracts. The software asset manager also evaluates the usage of software licenses to make sure that the organization is not over purchasing licenses. |
Approver |
| An approver can be any person in your organization. |