Chris, As an afterthought to my previous email, if you do learn anything, good or bad about Patch 004, would you please be kind enough to share it with the list? Since you are already working on it it might be useful to some of us. I'm sure my team might like to upgrade too. Plan to do some release notes reading this weekend..
Thanks Joe -----Original Message----- From: Joe D'Souza [mailto:[EMAIL PROTECTED] Sent: Tuesday, June 05, 2007 7:59 PM To: ARS Discussion List Subject: RE: Design???? Feature??? Oversight?? Bug? Roger, I wouldn't change permissions as such. It looks like with every patch, there are some very basic fundamental changes to the ITSM application functionality. From the past fixes I have seen these changes range from things like definition change on forms, to changes in qualification on table fields etc. If you modify the current existing OTB workflow, you are likely to end up with additional work if you need to install any of the patches that may be released in the future to address the same issue. You would be better off reporting such issues and leaving them untouched unless they render your system unusable if not touched. Given that, I think Rick's idea is better than making a structural change to the application even if it is alteration of permissions. Rick's idea involves altering application data, which could be easily rolled back later if a patch is released to fix the issue. I am totally with Christopher.. I did question similar design features with their frontline and got pretty vague responses on why its been done that way. One such area is the fact that they have the addition of site information unique to a company meaning that 2 companies can't really share the same site. The good news though is that you can work around that and go to the site configuration and add another company to that site. This could have been better designed to have it work both ways to either add a site to 2 companies or to go to that site and make 2 companies associated with that site. At least at the incident and problem application level they haven't enforced that restriction and kept it just at the data configuration level. In today's world do they really think its a good idea to restrict a site to just one company?? That's hardly practical. Count the number of companies that are merging where they operate as individual companies but might have a common sales department. We too have our test read users receiving a number of notifications that they don't have access. I don't even want to raise a issue regarding that as I'm pretty sure what their response would be.. Or maybe I should to be one of the many who might have already raised this as an issue so that they do something about it.. Joe -----Original Message----- From: Action Request System discussion list(ARSList) [mailto:[EMAIL PROTECTED] Behalf Of Roger Justice Sent: Tuesday, June 05, 2007 7:10 PM To: arslist@ARSLIST.ORG Subject: Re: Design???? Feature??? Oversight?? Bug? ** I found the same thing and tried to use permission on the applications to reduce the potential issue. The client decided they wanted a large button in the middle of the home page that will take the requesters to the Requester Console and this has eliminated any one trying the other urls in the application list since most users just want their problem fixed and they don't dig like us technology people. -----Original Message----- From: Joe D'Souza To: arslist@ARSLIST.ORG Sent: Tue, 5 Jun 2007 6:10 pm Subject: Design???? Feature??? Oversight?? Bug? First of all I am using ARS V7.0.1 Patch 002 and ITSM apps (the whole shebang) V7 patch 003.. We are on SQL server 2K5 SP2 and on Windows 2K3 SP 2 as well. If I log into the system using a read user who has restricted access in the system I see the Application Administration Console link. I can click on this link and that does take me to the next administration page.. here off course it restricts me from going further complaining that I don't have admin rights if I try to click on any of the Create or View buttons/URL's. Why are read users even allow to go so far though? Is it by design that they have allowed users to go that far? Is there some sort of benefit that I am overseeing? Another area where users are able to intrude where they should have not been able to go to are certain parts of the Foundation Elements.. These users can click the Overview Console link of the Foundation Elements, and see Other Applications, pull down that menu and click on links like Incident Management and then get errors like "ARERR [353] You have no access to form : HPD:Incident Management Console" They can even click on the CMDB link here and navigate to most parts of the CMDB consoles and get those no access errors there again but some of the consoles are open to these users.. Can any of you guys running these same applications, reproduce this or is it just me? Joe PS: Most of my users have been mass loaded using a utility provided by Remedy that I once discussed about about 3 weeks ago. But even the users that have been manually created as read users with restricted access exhibit the above... No virus found in this outgoing message. Checked by AVG Free Edition. Version: 7.5.472 / Virus Database: 269.8.7/830 - Release Date: 6/3/2007 12:47 PM No virus found in this outgoing message. Checked by AVG Free Edition. Version: 7.5.472 / Virus Database: 269.8.7/830 - Release Date: 6/3/2007 12:47 PM _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the Answers Are"