Got it. Makes sense if users have those kinds of access and are not limited to just the web access.
Thanks for the reply. :) Deepak Sent from my iPhone > On Oct 9, 2013, at 5:47 PM, LJ LongWing <lj.longw...@gmail.com> wrote: > > ** > One down side to it is that active links are only client side. If these > people shouldn't have access to the data, then it needs to not even be > filters...it needs to be permissions. Active Links would stop someone from > getting the form open....but what about searches in consoles that show the > data? What about the ODBC/JDBC reporting capabilities....those don't fire > workflow...they just use permissions to access data. > > Active Links would provide one layer of 'stop'...but it would only be one, > and it would be overall ineffective in the entire system. > > >> On Wed, Oct 9, 2013 at 4:43 PM, Deepak Pathak <dpathak1...@gmail.com> wrote: >> ** >> So why can't we just create the necessary active links to impose those >> restrictions each time someone searches or tries to view / modify a change >> or incident? These can just be custom objects and when you put the form in >> search mode you could automatically restrict the search . >> >> Other than the complexity to derive the access restrictions I don't see any >> other downside to it. Am I incorrect ? >> >> Sent from my iPhone >> >>> On Oct 3, 2013, at 11:32 PM, Ray Gellenbeck <raygellenb...@yahoo.com> wrote: >>> >>> ** >>> Agreed. >>> >>> We'd prefer the ability to say... >>> >>> "This group's tickets are invisible to everyone else, including sister >>> support teams within our company and other companies. >>> >>> This data in CMDB can be seen by all in our company, but not others. >>> >>> This data in CMDB can be seen by all companies >>> >>> These support KB articles are only for NOC people. >>> >>> These SRM catalog entries are for all companies except (x) and (y). >>> >>> etc" >>> >>> In Sony's case, we'd like to offer the app to other sister divisions while >>> keeping some elements proprietary to ours, but take it a step deeper and >>> say "the SOC's tickets cannot be viewed by anyone not in the SOC group(s)." >>> >>> I have played with 8.1 in a dev sandbox but not delved into multi-tenancy >>> changes yet. In 7.6.04, the model was insufficient in complexity/options >>> to allow this efficiently. >>> >>> Ray Gellenbeck >>> Mgr, BSM >>> Sony Network Entertainment Int'l >>> San Diego, CA >>> >>> From: John Marshall <marsh...@gmail.com> >>> To: arslist@ARSLIST.ORG >>> Sent: Thursday, October 3, 2013 8:46 AM >>> Subject: Re: Support Company based muti-tenancy >>> >>> ** >>> Hi Ryan, >>> >>> I think that this phrase sums up perfectly what multi-tenancy is “Tenancy >>> is based and controlled at the Company level”. >>> >>> However, I think for my issue I would like multi-tenancy to be defined as >>> “Tenancy is based and controlled at the _Organizational_ level while >>> allowing access to company level data” >>> >>> Here is what I _think_ the issues would still be trying to setup the system >>> with support users having unrestricted access and the end users having >>> access to specific companies. >>> >>> 1. If I give the support users "Unrestricted Access" then all the support >>> users will see ALL the tickets in the other organization’s area and we only >>> want them to see items in their area >>> >>> 2. End users belong to an overarching company of which all the other >>> (support) organizations are children of that company, so end users will >>> belong to that overarching company vs. a specific “sub company” >>> (organization) >>> Let me see if I can give a use case based on what I really want to do... >>> I work at GWU and ALL the users (end users and support users) will need to >>> belong to the company "GWU". >>> I also have 2 organizations, IT and AT, that want to be able to be >>> completely autonomous from one another but still use the same user base >>> (GWU users). I would like to setup the support user in the IT group to >>> belong to a IT “company/org” and the AT support users belong to a AT >>> “company/org” >>> So when a user calls IT to report an issue, I would like the IT people to >>> be able to >>> a) Retrieve the user records from the GWU pool of users (which we can with >>> Support Company Access Config) >>> b) Have the business rules for IT be used to process the ticket. >>> c) Not have the AT group be able to see the tickets that belong to IT >>> Then I would like the same to happen for the AT group when a user calls AT >>> to report an issue. >>> I think the highest priority is based on Incident and Problem, but this >>> would need to cascade to the other ITSM modules as well >>> Again, thanks for the input. Hopefully the above clears up a little bit >>> what I am looking for, however I think that might not be something that can >>> be done with just configuration options (but I am hoping to be proven wrong) >>> >>> John >>> >>> >>> >>> On Thu, Oct 3, 2013 at 9:53 AM, Downing, Ryan <ryan_down...@bmc.com> wrote: >>> ** >>> Hi John, >>> >>> If I understand your dilemma correctly then ITSM 8.1 should be able to >>> handle this scenario with the following assumptions: >>> >>> 1. Support people have "Unrestricted Access" >>> 2. End users have "Restricted Access" to the Company (department) to which >>> they belong >>> >>> In ITSM 8.1 multi-tenancy works as follows: >>> >>> Ø Multi-tenancy is a feature in the BMC Remedy Applications that enables >>> you to control which records and specific configuration data are exposed to >>> a user, based on the user’s permissions. Tenancy is based and controlled at >>> the Company level. Various forms in the BMC Remedy Applications expose one >>> or more Company fields that control the tenancy access for a given record. >>> Ø Row-level security typically works as follows: >>> o On main user facing transactional forms: >>> § Tenancy is based on the Customer Company and/or Process Company defined >>> on the record (sets field 112) >>> § Tenancy is also based on the Support Companies assigned to a record >>> (sets field 60900) >>> o Child forms: >>> § Child form should inherit their parents tenancy permissions >>> o Join forms >>> § Tenancy should be inherited from either the primary or secondary form >>> identified within the join criteria especially if one of the forms is a >>> user facing transactional form >>> >>> Ø Tenancy is implemented using the Row-level Security feature of AR. In >>> summary we determine which groups or roles have access to a request through >>> the permissions on the Request ID field (field ID 1). >>> - In the Remedy Applications this is controlled by the following >>> permissions on field ID 1 >>> § 1000000000 = Unrestricted Access >>> § 7 = Assignee Groups (field 112) >>> § 60900 = Vendor Assignee Groups (field 60900, typically only used for >>> transactional based forms) >>> - These permissions are used to drive the tenancy model in the >>> apps. Both Assignee Groups and Vendor Assignee Groups are referred to as >>> Implicit Groups in AR. >>> - In the apps we assign Company permission groups to these two >>> Implicit Groups to control access to records. Hence our tenancy model is >>> based on Company access. Unrestricted Access permission group is a regular >>> AR permission group. If a form is going to be row-level secured in the >>> Apps (or multi-tenant) we typically assign these three permission groups to >>> field ID 1 on that form. Note, Vendor Assignee Groups (field 60900) >>> typically contains the AR permissions group ID for Support Companies that >>> are assigned to a record (e.g. for Incident that would be the Assigned and >>> Owner Support Company; for Change that would be the Change Coordinator and >>> Manager Support Company, etc.). The Vendor Assignee Groups permission is >>> not required on all forms and it typically found on transactional based >>> forms. >>> - So in order for a user to see a record, on a form that is >>> multi-tenant, they need to either have the Unrestricted Access permission >>> group, which gives them access to all records as this is defined on field >>> ID 1 on all tenant forms OR they need to have access granted by one of the >>> two Implicit Groups. >>> >>> You’re use case in ITSM 8.1 would mean that the customer company is stored >>> in field 112 (Assignee Groups) and the support user company is stored in >>> field 60900 (Vendor Assignee Groups) (on all main transactional forms: >>> incident, problem, change…etc…). Since Field ID 1 on these forms has >>> permissions to both field 112 and 60900 the appropriate people should see >>> the request. >>> >>> Support users should be allowed to see all requests as they have >>> unrestricted access. >>> >>> (hopefully I have understood you’re use case properly J) >>> >>> Hope this helps. >>> >>> Regards, >>> Ryan. >>> >>> >>> -----Original Message----- >>> From: Action Request System discussion list(ARSList) >>> [mailto:arslist@ARSLIST.ORG] On Behalf Of John Marshall >>> Sent: Monday, September 30, 2013 2:28 PM >>> To: arslist@ARSLIST.ORG >>> Subject: Support Company based muti-tenancy >>> >>> I wanted to see if anyone out there can give me some suggestions on how to >>> accomplish the following in the ITSM 8.1 environment WITHOUT any coding >>> changes… >>> >>> I am working for a university that has several departments that would like >>> to use the ITSM in a multi tenancy fashion; so each department would like >>> to have their own set of rules, support groups, etc. and NOT allow the >>> other departments to see their tickets and them not see the other >>> department’s tickets. >>> So far, it sounds like a straight multi-tenancy setup, however the issue >>> here is that ALL the departments would like use the same user base but have >>> their department rules apply. >>> >>> I know that I can use the “Support Company Access Config” to share the >>> people data across the various departments, but then my dilemma is that >>> when a support user select a customer, that customer’s company gets >>> populated with a company which might not be (and probably won’t be) the >>> same company (department) of the support user, so the support user’s >>> company (department) rules will not be applied, it will be the rules >>> associated to the customer's company. >>> >>> Any ideas/suggestions on how to force it to be the support person’s company >>> (department) rules, again, short of coding changes? >>> >>> Thanks for any help/ideas/etc. >>> >>> John >>> >>> _______________________________________________________________________________ >>> UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the >>> Answers Are, and have been for 20 years" >>> _ARSlist: "Where the Answers Are" and have been for 20 years_ >>> >>> _ARSlist: "Where the Answers Are" and have been for 20 years_ >>> >>> >>> _ARSlist: "Where the Answers Are" and have been for 20 years_ >> >> _ARSlist: "Where the Answers Are" and have been for 20 years_ > > _ARSlist: "Where the Answers Are" and have been for 20 years_ _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the Answers Are, and have been for 20 years"