EOM Console
Administrators can use Role Manager to define and modify the security roles of users and groups. The Role Manager utility consists of different types of roles and corresponding security-related permissions that can be granted or denied to each role. There are three roles defined in Barr EOM:
EOM Document Owner - Defines the rights, or permissions, of document owners. You can limit or extend the permissions of document owners as appropriate. For example, an administrator who wants to prohibit document owners from assigning documents to destinations would remove this permission. This role is limited to Documents and Library applications.
EOM System Administrators - Defines the members and permissions for system administrators. System administrators can configure and manage all of the security permissions. As with the Document Owner role, you can limit or extend the permissions of system administrators as needed. By default, all permissions are granted to the System Administrators role at the time of installation; you can modify permissions as appropriate for the installation. A company might have several system administrators. This role defines permissions for all applications, that is, Destinations, Sources, Documents, Library, Reports, and Administration.
EOM Security Administrators - Is identical to the role of System Administrator except that a subset of permissions is always unavailable for modification; this safeguard insures that an installation does not accidentally lock itself out of Barr EOM, preventing the configuration of security permissions. A company typically would have only one Security Administrator.
These permissions are set for the role and cannot vary for users or groups within a role.
You can add and remove users and groups from the System Administrator and Security Administrator roles as needed to manage security access; for example, you might want add a system administrator to serve as backup to an established system administrator.
Permissions can also be set through the Destinations, Sources, and Documents applications, and for the EOM Console.
Complete the following steps to add users or groups to a security role.
From the EOM Console menu bar, select Tools | Security Roles. The Role Manager – Membership dialog box is displayed.
In the Role name box, select the role to which you want to add a member.
Because a document can have only one owner, you cannot add members to the Document Owner role.
Click Add. The User and Group Selection dialog box is displayed.
From the grid, select the users or groups that you want to add and click OK.
If a user or group is not listed, click More Users to locate the user. From the More Users list, you can choose to add EOM users, LDAP users, or Windows users and groups. You can also choose to import LDAP users and groups. When you are finished, click OK. See the Adding users and groups to Barr EOM topic for detailed procedures on adding users.
Click OK.
Complete the following steps to remove a user or group from a security role.
From the EOM Console menu bar, select Tools | Security Roles. The Role Manager – Membership dialog box is displayed.
In the Role name box, select the role from which you want to remove a member.
From the grid, click the users or groups that you want to remove.
Click Remove.
Complete the following steps to modify the security permissions of a role.
Permissions are set for the role and cannot vary for users or groups within a role.
From the EOM Console menu bar, select Tools | Security Roles. The Role Manager – Membership dialog box is displayed.
Next to the Role name box, click the Browse (…) button. The Role Manager – Manage dialog box is displayed.
Select the role you want to modify and click Modify. The Role Manager – Configuration dialog box is displayed. This dialog box lists, in tree form, all the security permissions for the selected role.
Modify permissions by selecting or clearing check boxes. When you are finished, click OK.
In the list of permissions for the Security Administrator role, a subset of permissions is unavailable for modification so that security can always be configured.
Click Close.