100% (1) 100% found this document useful (1 vote) 2K views 58 pages Access Manager Guide
Teamcenter Access Manager Guide (SIEMENS)
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save Access Manager Guide For Later Teamcenter® 2007
Access Manager Guide
Publication Number
PLMo0020 CProprietary and restricted rights notice
This software and related documentation are proprietary to Siemens Product
Lifecycle Management Software Inc.
© 2007 Siemens Product Lifecycle Management Software Inc. All Rights Reserved
All trademarks belong to their respective holders.
cose Manager Guide PLwo0020 ¢Contents
Getting started 6.6... cece e cece cece ee een n teeter ene een Del
Access Manager interface 1
Basic concepts about Access Manager 13
Basic tasks using Access Manager zig
Creating and managing Access Manager rules ..... 0.60. s0ee0eeee8 Sel
Best practices and cautionary statements a4
Understanding the rule creation process 22
Add an Access Manager rule 23
Modify an Access Manager rule 23
Delete an Access Manager rule 23
Reposition an Access Manager rule in the rule tree 23
Creating and managing access control lists (ACLS) .......6se0ee0e8 Bel
Create an access control list (ACL) 34
Modify an access control list (ACL) 32
Delete an access control list (ACL) 32
Distributing, reverting, and repairing the rule tree .....4. 66. 60e005 Aol
Export the Access Manager rule tree 42
Import the Access Manager rule tree 42
Verifying the effect of accessrules 6.6.6.0. 0s eee eeeee ene eneen ene Bel
View access privileges Bl
View the rules from which privileges are derived 52
View the access control list (ACL) associated with the object 53
GLOSSALY eect enter nee ees Bel
Index eee eee ee cece ence eee nee e nett eens ene eee IndexeL
Figures
5-1. Viewing access privileges 52
5-2. Extra Protection dialog box 52
5-3. ACL Control List dialog box 53
PLMo020 ¢
Access Manager Guide 3Contents
Tables
1-1 Before you begin 1
1-2 Access Manager menu commands 1
13. Access Manager buttons 12
14. Data life cycle 13
15. Rule tree conditions 19
1-6. Accessor types by category 115
17. Access privileges Lis
4 Asceee Manager Guide PLwo0020 ¢Chapter
PLMo0020 ¢
Getting started
Access Manager interface
‘Access Manager menus
‘Access Manager buttons
‘Access Manager symbols
Basic concepts about Access Manager
Protecting Teameenter data
Life cycle of data
Rules-based protection
Object-based protection
Access Manager rule tree
How rules work
Rule tree conditions
Accessor types and accessor precedence
Access privileges
Basic tasks using Access Manager
Access Manager GuideChapter
Access Manager
PLMo020 ¢
Getting started
Access Manager controls user access to objects in Teamcenter ® using the Access
‘Manager (AM) rule tree, which is a collection of rules applicable at your site
For more information, see Basic concepts about Access Manager and the Security
Administration Guide.
Table 1-1. Before you begin
Prerequisites
Enable Access
Manager
Configure Access
Manager
Start Access
Manager
terface
‘You must have system administrator privileges to use Access
‘Manager.
Access Manager does not need to be enabled before you use it. If
you are an administrator, you can use Access Manager
Access Manager does not need to be configured before you use it.
Olick Access Manager ®% in the navigation pane
Note
If the Access Manager button is not displayed in the
navigation pane, click i at the bottom of the navigation
pane and choose Show More Applications.
All Access Manager menus are standard Teamcenter rich client menus except for
those described here, For additional information, see the My Teamcenter Guide.
Access Manager menus
Table 1-2, Access Manager menu commands
Menu command
Description
File>Import
File-Export
Editup
‘Browses for the ASCII file containing the rule tree
data and then imports the file
Browses for the ASCII file containing the rule tree
data and then exports the file
Moves a rule tree entry up one branch at a time within
the same level
seae Manager Guide 1-4Chapter 1
Getting started
Table 1-2, Access Manager menu commands
Menu command
Description
Edit>Down
View—Expand Below
Moves a rule tree entry down one branch at a time
within the same level.
Expands the rule tree to display subbranches,
Access Manager buttons
Table 1-3, Access Manager buttons
Button
Description
Move Rule Up f
Move Rule Down +
Add +
Modify °*
Delete x
Save
Create ACL
‘Moves a rule tree entry up one branch ata time within
the same level
Moves a rule tree entry down one branch at a time
within the same level
‘There are two Add buttons
‘The button to the right of the access control entry
(ACE) table adds a new row to the table.
‘The button at the bottom of the pane adds the rule to
the Access Manager tree.
‘Modifies the selected rule and/or access control list
(ACL)
‘There are two Delete buttons
‘The button to the right of the ACL Name box deletes
the selected ACL.
‘The button at the bottom of the pane deletes the
selected rule from the Access Manager tree,
There are two Save buttons
‘The button at the top right of the ACE table saves the
ACL.
‘The button in the toolbar saves changes to the rule tree.
Creates the ACL after you enter a name in the ACL
Name box,
Access Manager symbols
Access Manager uses symbols to represent privileges that can be granted using
access control lists (ACLs), For more information, see Access privileges,
462. songs Manager Guide
PLwo0020 ¢Getting started
Basic concepts about Access Manager
PLMo020 ¢
‘To take full advantage of Access Manager, you should be familiar with the data
access methodologies, rules, accessors, and privileges that are used to implement
data access protections. For more information about data security, see the Security
Administration Guide.
Protecting Teamcenter data
Object protection and ownership are extremely important in a distributed computing
environment, Objects represent actual product information in the database and
must be protected from unauthorized or accidental access, modification, and deletion
‘Teamcenter implements two different tiers of data protection:
© Rules-based protection
Rules-based protection is the primary security mechanism,
* Object-based protection
Object-based protection is a secondary security mechanism that allows you to
grant exceptions to rules,
Life cycle of data
All data in an enterprise typically passes through three basic phases, Released,
In-Process, and Working
Table 1-4. Data life cycle
Data state Description
Released Data is formalized and must be protected from modification
Released data is often consumed by users outside the authoring
group; whereas, in-process and working data is consumed by
authors and generally requires more restrictive read access.
In-Process Data is semiformalized and because it is in the process of being
released, it is assumed to be accurate and in its final form
However, allowances must be made for last-minute changes. The
primary objective for protecting in-process data is to ensure that it
is tightly controlled while it is being released
Working Data is not very firm and is expected to undergo many changes
before it is released, The objective for protecting working data is
to ensure that only the right persons have permission to view,
modify, or manipulate the data.
Rules-based protection
Rules control access to data on a global basis by determining whether a user has
permission to view or perform an action on an object, Rules filter data according to
the attributes of the data and grant privileges to the data according to the users IDs
and their session context (the group and role they used to log in), Rules are defined
by a combination of a condition, a value for that condition, and an access control
list (ACL) that grants privileges to accessors, The condition and value identify the
Access Manager Guide 43Chapter 1
Getting started
set of objects to which the rule applies, the ACL defines the privileges that will
be granted to users (accessors)
The following syntax applies to rules:
Condition (Value}®ACL
For example:
Has Type {UGMASTER}® UG Model
In this example, Has Type is the condition, UGMASTER is the value, and UG
‘Model is the name of the ACL.
‘The parts of the rule can be thought of as an IF clause and a THEN clause, The
condition and value supply the IF part of the rule and examine the object with
Boolean logic, and the access control list (ACL) supplies the THEN part of the rule
by describing access permission
Object-based protection
Object-based protection introduces exceptions to the access rules for a specific
object. Unlike rules, which can only be created and maintained by authorized
administrators, ACLs that specify exceptions to rules can be defined by any
‘Teameenter user who has change privileges to the object.
Access Manager rule tree
Rules are organized in the Access Manager rule tree and are evaluated based on
their placement within the tree structure, The default rule tree included in your
‘Teamcenter installation assumes that users are granted privileges unless explicitly
denied, The rules are evaluated from the top of the tree to the bottom of the tree,
with rules at the top of the tree taking precedence over rules at the bottom of the
tree. The rule tree acts as a filter that an object passes through when a user attempts
to access the object. When conditions that apply to the selected object are met, the
privileges defined in the ACL are applied.
Note
Subbranches always take precedence over parent branches in the tree
‘The Access Manager application displays the rule tree
‘% Has Class(POM_object)
‘© Has Bypass(true) -> Bypass
© © Has Class(POM_object) —> System
© In Job(true)
‘© Has Status(TCM Released) -> TCM Released Rule
© Has Statua( ) -> Vault
© Has Object ACL(true)
‘© Has Class(POM_application_object) > Import/Export
© In Project( ) -> Projects
4-4 Asonge Manager Guide PLwo0020 ¢PLMo020 ¢
Getting started
© Owning Group Has Security(Internal) -> Internal Data
© Owning Group Has Security(Bxternal) -> External Data
‘© Has Class(POM_application_object) > Working
How rules work
Rules are defined by a combination ofa condition, a value for that condition, and an
access control list (ACL) that grants privileges to accessors, The condition and value
identify the set of objects to which the rule applies; the ACL defines the privileges
that are granted to users (accessors).
‘The following syntax applies to rules:
Condition (Value}® ACL
For example
Has Type(UGMASTER)® UG Model
In this example, Has Type is the condition, UGMASTER is the value, and UG
‘Model is the name of the ACL.
When a user attempts to access data, the rule tree is evaluated to determine
the privileges to be granted or denied. The following assumptions apply to the
evaluation:
© Rules higher in the rule tree are more global in nature and apply to all object
types
+ Lower-level rules refine access to more specific objects such as UGMASTER
datasets. For example
Has Class(POM_app_object)
Has Class(ataset)
Has Type(UGMASTER)
* Precedence determines the privileges granted. Accessor precedence in the ACL.
and rule precedence within the tree are both considered when granting access
privileges, Rule precedence is from top to bottom in the tree, with the highest,
rule having greatest precedence and the lowest rule having least precedence
‘Accessors have a predefined precedence in the system. For more information, see
Accessor types and accessor precedence.
% Has Class(POM_object)
‘© Has Bypass(true) —> Bypass
‘Gn Job(true)
Has Status( )—> Vault
Has Object ACL(true)
‘© Has Class(POM_application_object) —> Working
© Has Clasa(Item) -> Items
Accese Manager Guide 45Chapter 1 Getting started
© Has Clasa(Item Revision) —> Item Revs
© Has Class(Dataset)
‘© Has Type(UGMASTER) -> UGMASTER
‘The following ACLs are considered when the sample rule tree is evaluated:
* The UGMASTER ACL explicitly grants write access to users who fill the
Designer role in the owning group and explicitly denies write access to all other
users in the owning group
® 8 ow lf) x & » ” &
Read | Weite| Detete | change |Promote| Demote_| Copy
alee Owalag Group | Desgaee v
aie ie Ovalag Grup x
* The Working ACL explicitly grants write, delete, and change privileges to
owning users and write privileges to the owning group. It also grants delete and
change privileges to the group administrator and the system administrator All
other users are granted read and copy privileges and explicitly denied write,
delete, change, promote, and demote privileges.
® 3 “lal xfaytrwjoe ]e
Read | wetto| Delete | change | Promote] Demote | Copy
Crag Ur vilvlv
Group Adair vbw
Ova Group v
Sra Adair vbw
Won vi[xfx fx fx if x v
* The Vault ACL grants all users read and copy privileges and denies all users
write, delete, change, promote, and demote privileges.
468 conse Manager Guide PLwo0020 ¢Getting started
r 3 o~lalx]s x a ®
Read | Wette| Delete _| change | Promote| Demote | Copy
Wort vfi[xfx x x x v
Evaluating the rule tree
‘The rule tree evaluation results in an effective ACL that represents the cumulative
buildup of all the named ACLs that apply to the object the user is trying to access
‘The rule tree is evaluated as follows
© Alllines that do not apply to the object are trimmed from the rule tree.
Note
The rules are not removed from the tree, but they are ignored during
evaluation,
* The remaining lines in the tree are traversed by:
— Evaluating the child of a rule before evaluating the parent rule
— Evaluating child rules in order of precedence, from top to bottom, in the
event that there are multiple child rules.
* The effective ACL is determined by compiling the ACLs in the order that the
tree is traversed,
Example of building an effective ACL
When the user attempts to access a UGMASTER dataset, the rule tree is trimmed
to reflect only those rules that apply to the object.
Has Class(POM_object)
Has Class(POM_app_object) ->Working
Has Class(Dataset)
Has Type(UGMASTER) ->UGMASTER
Based on the trimmed rule tree, the effective ACL is compiled by evaluating the tree
(from bottom to top) as follows:
1. Find the topmost leaf node in the tree, in this case, Has Type(UGMASTER)
->UGMASTER, and add the U@MASTER ACL to the effective ACL,
2, Find the next node, Has Class(Dataset), which has no associated ACL so it
does not contribute to the effective ACL
3. Find the next node, Has Class(POM_app_object) ->Working, and add the
Working ACL to the effective ACL.
Pumooo20 ¢ sess Manager Guide 47Chapter 1 Getting started
4. Find the next node in the tree, which is the Has Class(POM_object) root node,
‘This node has no associated ACL, so it does not contribute to the effective ACL.
‘The rule tree evaluation results in the following effective ACL:
® accesso 8 ow lo) x oe ~ a | 8
Read | Wetto| Delete | Change | Promote | Demote | Cops | nate
ale ia Owalag Group | Desigoer v vy [vomasran
Word x x x [eonasren
Owaiag Uae viw lev WORKING
Group Adimiaitrotor vbw WORKING
Owaiog Group v WORKING
‘Speen Admialtrotor vbw WORKING
Word vixlx« fx [x x | v | WoRsING
‘The effective ACL is evaluated when a user attempts to access a UGMASTER
dataset and the lines that do not apply to the user are ignored. For example, if you
are a designer in the owning group of the UGMASTER dataset, but you are not the
owning user, system administrator, or group administrator, the following entries in
the ACL are applied when you try to access a UGMASTER dataset:
® sccemne 3 w~latx fo ~ a ]®
Read | Weite| Delete | Change | Peomote | Demote | Copr
Fale ia Owaiag Group | Designer v v
Wort x x x
468 Asonge Manager Guide PLwo0020 ¢Getting started
Accesme 8 ow | a) x oe
Read | Wette| Detete | change
Waid v x
After the effective ACL is trimmed to only the entries that apply to the user
attempting to access the dataset, the privileges in the remaining ACL entries are
evaluated by working down each privilege column until you encounter a granted
¥ or denied X symbol.
In this example, the privilege evaluation grants the accessor read, write, and copy
privileges and denies the accessor delete, change, promote, and demote privileges.
Rule tree conditions
Table 1-5 describes conditions in the base rule tree, by category.
Table 1.5. Rule tree conditions
Category Condition Value Deseeiption
“Admunteteative
Hos Bypass teue or false Specifies whether the usee hos bypass
privileges sat. Bypase privilege supersedes
other privileges.
Default
Hos Close clagename Specifies on object class. ‘The object is
evaluated to determine tact the specif
ioe
Hos attribute class attributesvalue Specifiesoa attribute aad value ssecrinted
with a particular casa,
lage isthe class of the object for
‘which you set the rule attribute is
1a attribute af the class. Supported
attribute types-re string, integer,
Aouble, logical, aad refereuce value
{a the value for which the attribute t=
evaluated
Note
Bloat spacesore actallowed
fa the rule syntax
“Logical values must be
‘either 0 (false) ot 1 (trv).
‘Raferoaces ooa oaly be
‘check foro ll_tog (0) or
‘poa-aull (non-zero) value
Hos Type ype-name Specifies the object type agaiast which the
object is evaluated
PLMo020 ¢ seae Manager Guide +8Chapter 1
Table 1.5. Rule tree conditions
Getting started
Desceiption
Category Condition
Ta dob
Hos Object ACL
Hoa Statue
Genecal
Hos Description
Hos Nome
Ho Form Attribute
Hos Item D
In archived,
440 Acces Manager Guide
‘ene of flee
tena of fotze
Accepts aull eatry ull-al
textsring
Note
‘The desriptioa value con
contoia wildcard characters,
textsring
Note
‘The name valve coa coataia
svildeotd choroctara
form-scorage-clase attribute=ualue
orm-sorageclassis the storage class
fe the form type on which you aot
the role attribute ia attribute of
the form Supported attribute types
ote POM string, POM iat, 203
POM double. value isthe value for
‘which the ottribute is evaluated,
Note
Bloat spacesore actallowed
fa the rule syntax
tomiad
Note
‘The item ID value cow
contota wildeord charactors,
tena of fotze
Specifies whether the target object isla
‘workiiow Job (process). This coaditioa does
aot expect oa ACL attoched toa rule This
placeholder tot iadieatesthe point ot which
‘workifiow ACLsate applied ia the rule tee
hierarchy
Specifies that an ACL isaseocisted with oa
‘object. Thiscoaditioa dose aot expect aa
ACL attached toa rule Ite placeholder
‘that indicates the point ot wich process
ACLs2ad object ACLs are applied ta the
Tule tres erates
Specifies the totus type against which the
object is evaluated.
Specifies description forthe object. The
object is evaluated to determine whether the
description motches thisvalue
Specifies aame against which the object
isevolunted
aables access coatral of thas oud iba
revisions by ssttiag conditiousoa attributes
cof the Mastevform cioea This rule co be
pplied tothe ItemRevifonMastee form
‘2 codtral arcane to the ita
‘This rule coa also be uasd to coutral write
ecess to the propertias of itemsad item
revisions which ia tura determiae who
cou ada or temare dotneste asscintad
‘with the itam of itu revision through 2
Specificatfoa relation
‘This rule conaot be used to contra access
‘to the cotnssts aad it caaact be applied to
‘usetlefaed forma I should beaded below
the Worlsing@ Item Revistoa/Ttem Rule
rule ia the role tree
Specifies item ID ogaiast which the item
isevolunted,
Specifies thatthe objectsarchive siotusis.
evaluated
PLwo0020 ¢Table 1.5. Rule tree conditions
Getting started
Category Condition Value
Desceiption
TeLosl ‘ene of flee
Taoctive Sequence teue or false
OwnersdhipiAccessoe
Owaiag User user ID
Owaiag Group sroup-name
Owning Site etename
(Owaiag Group Has tntecnal or external
Security
rasa, tena of fotze
Baa tena of fotze
Inccemental
PLMo020 ¢
‘Specifies whether the object's recideace
{a the loro dotaboee ie evaluated.
‘This condition ie uesd whaa Multi-Site
Colisboratioa i plemented
‘eed in coajuactioa with the Inactive
Sequence Objects ACL. This ccasitioa
specifies thot previous sequeaces are
historical oad coaaot be worked oa
ldepeadeatly. The latest sequeace is
always the working e=quecce for the
Bvoluates whether the objet is owaed by
the opecited usee
Bvoluates whether the objet is owaed by
‘the group uader which the user is lagged oa
tp Teowceatar
‘Wideard chatacters coa be used with
the Owning Group condition to allow
you to define rules applriag to group
‘ad oll it subgroupa. For example,
emume thot the Destgn group hos
thro subgroups AnalytaDedgn 20d
Development Design. By defaiag 3
value for the Owning Group cooditioa
Using 9 wildcard, you eoa defiue a geueral
ral fo coatral oovens tall dato raed by
‘the Design group ad its subgroups. For
comple
© Owntng Group
("Dedga)->dedgn_group_act
voluates whether the objet isowasd by the
specified at, This coaditioa is used whea
‘Molt-Sita Colisboratioa is iaplemeatad
voluotee whether the owaiag group af the
objecthosa security striag. Thiscoaditioa is
‘rus oaly ifthe security value ofthe owaing.
{group isequal to the value ofthis couditioa,
Specifies whether the usar’ eystea
aimlalstration group membership is
evaluated
Specifies whether the user's tatusasa
{group administrator ia the curreat group is
fraloted
Access Manager Guide 4-14Chapter 1 Getting started
Table 1.5. Rule tree conditions
Category Condition Value Desceiption
Ta 10 Contant ‘ene of flee ‘aablee structore edits escurreace edit
cxcurreace notes, transform edits oad
Note ‘ttochaeat edits) tobe coatrolled by the
Product Structure Kditor,Moauctoriag
Always use the true value Structure Balter, Collaboration Contant, of
{fr this condition. The Port Plogast application, Tae rule does aot
false applies the rule to depend ou the properties the object
oll obsets, regardless of
‘whether dructure editsore Whea thete {soa active iacraaaatol
being mode chouge ta the structure editor, the IC
Context true) coaditioa is mtisfied aad its
‘eaxiated ACL teopelied
Project
a Project projectD Specfieso project to which the object must
a Curteat Project
IaProject Member
Internatfonal
‘Teatne
(a Acme
Regulations
aman)
‘User Nationality
(Group Nationality
412 Acces Manager Guide
‘The syator for thisrule is
projectD
tena of fotze
‘Trocharocter 150 3160 codes
‘Thiscoadition accepts negation usiag
2 miaus(~ prefs For emmple,-us
ldiestescuy uset act ftom the US,
‘Trocharocter 150 3160 codes
‘Thiscoadition accepts negation usiag
2 miaus(~ prefs For emmple, -us
indicates aay user beloagiag toa
froup act ftom the US.
be Sougaed. The condition is evaluated 25
being true whaa the active projet to which
the object is assigned matches the project
specified for this rule condition. Ifyou
‘use aa empty striag 28 the value for this
coaditioa, the couditioa iadaemed true ifthe
object in Sesigaed to aay active project
Specifies the project ID against which
the object isevalunted. The condition is
evaluated a8 blag true whea the object ista
the curreat active project of the logged-oa
‘use, 20d the project ID of the curreat
project matches the value for thiscoaditioa.
Note
‘This rule ie act delivered with the
defoult iastallotion of Teounoaatat
aust be added mouvolly
Specifies whether the user's membership ia
the project is evaluated Thiscondition ts
aly true whea the user isa curreat member
ofthe project.
Specifies the antioaality 9 vast
Specifies the aatiouality of 2 group ot
orgatzstion.
PLwo0020 ¢Table 1.5. Rule tree conditions
Getting started
Category Condition
Value
Desceiption
‘User Laration
Site Loration
‘User Is TAR Licensed
Hos Goverameat
Clesifcation
Hos No Gorerameat
Classification
‘User Hos Goverament
clsoroace
‘User Is Excluded
Intellectual
property GP)
PLMo020 ¢
‘Trocharartar 15D 3160 codee
‘Thiscoadition accepts negation usiag
2 mlaus(~ prefs For emmple,-us
ladiestesaay user loosed outed the
us.
‘Trocharocter 150 3160 codes
‘Thiscoadition accepts negation usiag
2 mlaus(~ prefs For empl, -us
ladieatesaay user ata site outside
the US
tena of fotze
Specific goverameat classification
attribute values that coa be pref
by the following operators:
Specific goverament cleoraare
attribute values that coa be prefixed
by the felowing operators:
‘Specifies the loratioa ofthe user
Specifies the location of the site,
‘Vertis the existance of void ITAR licease
that anmes the curreat vost 280 liceasee
Volidates the goverameat classification
attribute valve of the abject agoiast the
value specified forthe condition
‘The operators cou be used without
fa clsoroace valve ia which cage the
{overameat classification attribute of the
object is compated to the user's clearaace
level based on the speciied operator
Note
1 the object hos uo goveramoat
lossifcotion attribute valve, thie
tule does act opel.
‘Motches if the object hosa aull value for the
{goverameat clossiicatioa attribute
Volidatas the vaet’scleoroace level against
the value specified forthe couditioa
‘The operators coa be used without a
claorouce valve a which coos the wost’s
cleoraace iscompoted to the goverameat
‘laseiicatiog attribute of the abject sad oa
the specitied operator
Note
1 ao value is supplied, the user
aust have oclmoroace value ost
Specifies whether the user o group iscited
bya valid esclusioa lcease,
Accees Manager Guide 1413,Chapter 1 Getting started
Table 1.5. Rule tree conditions
Category Condition
Value
Desceiption
‘User Hoe Cleoraace
Object Hae IP Classification
HosNo IP Classified
‘User Is Licensed
‘Specific clearaace values tint caa be
prefsed by the folowing operators:
Specific IP classification attribute
values that caa be prefized by the
{ellowiag operators:
tena of fotze
‘Validatas the uaerscleoroace level aginst
the value specified forthe couditioa.
‘The operators coa be used without a
claprouce valve ia which coos the wost’s
cleoraace iscompated t the IP classification
ptteibute ofthe object based on the specified
operator
Note
1 the dota ie aot IP closaifed,
the Uaw HaeIP Cleaeance
‘condition is evaluated ae bag true
regardless of whether or act the
user is assigned a clearaace level.
Volidates the IP clasadcatioa attribute
valuecf the object against the value specified
fe the coadition|
‘The operators caa be used without a
cleoraace value, the IP classification
tteibute of the object is compared to the
Uosr'acleoraace level booed oa the specified
operator
Note
[the object has no IP classification
‘ttribute value this rule does aot
pels
‘Motches if the object basa aull value for the
IP classification attribute
If at to true verifies the existence of 2
valid (aot expited) IP licease thot anes the
curteat user of thetr group a8 licensee
Accessor types and accessor precedence
‘An accessor is a user or group of users who share certain traits, such as membership
in the group that owns the object or membership in the project team. The following
list presents the predefined accessors delivered with Teamcenter in order of
precedence, from most restrictive to least restrictive, The more restrictive the
accessor, the higher precedence it has over other accessors
Approver (RIG)
Approver (Role)
“Approver (Group)
Appeover
Task Owner
Task Owning Group
Responsible Party
Owning User
User Excluded
‘User ITAR Licensed
414 Acces Manager Guide
PLwo0020 ¢Table 1.6. Accessor types by category
‘User ITAR Unlicensed
Getting started
‘User Under Government Clearance
‘User Has Government Clearance
User Over Government Clearance
User IP Licensed
User IP Unlicensed
‘User Under IP Clearance
‘User Has IP Clearance
‘User Over IP Clearance
User
Group Administrator
Role in Owning Group
Role in Projects of Object
Role in Geoup
Role in Project
Role
Owning Group
System Administrator
Group
Current Project Team
Current Project Teams
Project Team
Groups with Security
Project Teams
RoleInAny Schedule
RoleInSchedule
Public Schedule
World
Site
Remote Site
For descriptions of each accessor type, see table 1-6.
Table 1-6 describes the accessor types by category,
Category
‘Acceame
Deseeiption
Genecal
PLMo020 ¢
Owning User
Owning Group
Group
Groups with Secuctts
Role
‘Users who iaitilly ctented 20 object. Owaership coa be
‘rousferred aad odditiouol privileges for example, delete) ore
usually groated toa object's owaer that are uot graated to other
(Group thot owas the object. Usually, tis the group ofthe user
creotiag the object. Additional privileges for example, write) may
be granted to the owaiag group, because it common for usersto
shore dato with other aeabers of tlt group
Project-orleatad cluster of users, Taisollr2all users ia a group
‘tnarcessa commioa panl af project data regardless ofthe actual,
‘work each wast petforaie
‘Users who have the givea security value, ether Inteenal of
External
Foaction-oieated cluster of ussra
Acceos Manager Guide 445Chapter 1 Getting started
Table 1.6. Accessor types by category
Category Accosme Deseeiption
Role fn Group ‘Usete who havea speci role tao apecfc group Use thie for
gronting privileges tooll users performing the some eills andlor
Tesponsibilitieso the mae project
Role (a Owning Group ‘Users with 9 specific role ia the objects owatag group. This
useful for grouting privileges to 2a ianer-citle of users with
‘the some ails aadlor responsiblties oa the some project. For
sample, oll designers ia the owaiag group ate usually graated
‘white privilege oa their development dota,
System Admalntsteator ‘Users whoote members the system admiaistration group.
Group Admit stator ‘User who hoe special aiateaoace privileges forthe group,
Site A specie site
Remote Site ‘Ay site that is wot local
Worta Any user, regardless of group or role
Use A specie user
Wortsfow
Approver (RIG) Users who ore members of siguaff teom tao workflow process
‘with 9 epecidic rte in 9 specific group (RIG). This accessor is aly
used ia Workflow ACL aad motches the sigacff RIG requirements
{or the release level assented with the motifiow ACL.
Approver (ole) Users whoote memborsof sigacf team ia 3 woeliow proce
epeciti rale
Approver (Group) Users who ore members of siguaff teom ina workflow process
a> specite group,
Approver Users who are members. signoff teom ina workflow process
regardless of thet tale oad group.
‘Tad Owner ‘oak owasr ia given privileges for the tad’ torget dota,
‘Tad: Owning Group The orig gtoup ote given privileges forthe toa’ torget dato
Responsible Party ‘Users responsible for performing o particulot task. This easures
‘that only the user assigned as respoasible party in given privileges
‘the tnd torget dat
Project
Project Team Teom members in a particular projet
Project Teams ‘Team members ia aay active project for the object
Current Project Team Users who are members ofa particulsr curteat project team,
Applicable oaly whea the projects st aa the current project ofthe
‘row mambersoud ifthe curreat project ie active
Current Project Teams Users who ote membersofcurret project teams Applicable oaly
‘when the object is a the curreat project of the team members,
‘ond the current project isactive
Role tn Projectsof Object ‘Users who have 2 specific ros ia one of the projects af the
object. This accessor Ia affected by the values ast ia the
AMLPROJECT MODE prefereace. It is effective only whea the
‘ser islogged in withthe specified rol ia the curteat project, oad
the curreat project is one of the projects assigned to the dafiaed
object
Role in Project Project members with 9 specific role ina specific project. This
446 Acces Manager Guide
Is afacted by the values set ia the AM_PROJECT_MODE
preference,
PLwo0020 ¢Table 1.6. Accessor types by category
Getting started
Category Accosme
Deseeiption
‘Scheduler
Public Schedule
Rotelaschedule
RotelnAny Schedule
rar,
‘Use Excluded
‘Use HasGovernment Cleacance
‘Use ITAR Licensed
‘Use ITAR Unlicensed
Use Under Government
Cleacance
‘Uae Over Government
Cleacance
‘Use IP Licensed
‘Use IP Unlicensed
Use HasIP Clearance
‘Use Over IP Clearance
‘Use Under IP Cleaeance
‘Access tooll waste for schedules which ore teaplatee of wade
public. Thisarcessne 2pplies to the Schedule Maanger application
Dembership privilages of the logged ia vast withia 9
potticulor ehedvle Member privileges (accessor IDs) con be
COORDINATOR, PARTICIPANT, or OBSERVER. This
‘content applies tothe Schedule Macager pplication,
Membership privileges of the logged ia user ocrossall ececles
{a the syetam. Member privileges (scent IDs) coa be
COORDINATOR, PARTICIPANT, ot OBSERVER. This
‘content applies tothe Schedule Macager pplication,
‘The user or group iscited ia 2 valid exclusion liceuse attached to
the object.
Compares the user's claorouce withthe objec closaifcatioa oud
‘testa whether the user hosclearaace above, belo, of quo fo that
requited to sees the abject
‘User cited ia acurreut iceuse aasxcinted withthe selected object
‘User is uot cit ia a current lioause associated with the selcted,
object
The user's cleoraace is below the level required by the object This,
ecessor is typically used to revo access aad is ouly applicable
‘whea the goverameat cleave oa the uset oad the goverameat
Clousifcatioa oa the object come ftom commoa multi-level scheme
defined by the TEAR eval Ifst_ordering preforeace
‘The user's clearaace isover the level required by the object. Tht
Decessor is typically used to groat access. is oaly applicable
‘hea the goverameat cleoroare oa the uset oad the goverameat
classifcatioa oa the object come from 3 commoa multi-level scheme
defined by the TEAR level Ifst_ordering prefereace
‘User iacitad tao current licease associated with the selected abject
cither directly or by membership ia 9 cited orgaaizatioa (group)
‘User ia uot cited ia a current lioause associated with the selcted,
object
Compares the user's claorouce withthe objec closaifcatioa oud
‘testa whether the user hosclearaace above, belo, of quo fo that
requited to sees the abject
‘The user's clearaace isover the level roquited by the object. Thi
ecessor is typically used to groat access.ad is oaly applicable
‘when the IP cleoraace oa the wast oad the IP claeefcatioa oa the
‘bject come from o common multi-level scheme daflaed by the
IP level list ocdertng prefereace
‘The user's cleorauce is below the level required by the object This
ecessor is typically used to revo access.aad is ouly applicable
‘when the IP cleoraace oa the wast oad the IP clnesfatioa oa the
‘object come from 9 common multi-level scheme daflaed by the
IP level list ocdertng prefereace
PLMo020 ¢
Accees Manager Guide 4-7Chapter 1
118
Getting started
Access privileges
‘The following table describes the Teamcenter access privileges and the symbols that
represent these privileges in the user interface.
Table 1-7. Access privileges
‘Symbol Privilege Description
on Read Controls the privilege to open and view
an abject.
o Weite Controls the privilege to modify the
object.
x Delete Controls the privilege to delete the object.
x Change Controls the privilege to modify object
protections that override the rules-based
protection for the object. You must have
change privileges to apply object-based
protection (object ACLs).
~ Promote Controls the privilege to move a task
forward in a workflow process
a Demote Controls the privilege to move a task
backward in a workflow process.
Copy Controls the privilege to copy an object.
Change ownership
° Publish
a Subscribe
a Export
a Import
ib Teansfer out,
Transfer in
&
Write Classification
Ico
Accees Manager Gutdc
Controls the privilege required to grant,
change, or restrict ownership rights to an
object.
Controls the publish privilege to users or
groups,
Controls the privilege to subscribe to an
event on a specified workspace object
Controls the privilege to export objects
from the database.
Controls the privilege to import objects
in to the database.
Controls the privilege to transfer
ownership of objects when they are
exported from the database
Controls the privilege to assign ownership
of objects when they are imported in to
the database.
Controls the privilege to write
Classification objects (COs)
PLwo0020 ¢Table 1-7. Access privileges
Getting started
‘Symbol Privilege
Description
¥ ‘Assign to project
© Remove from
project
e Remote checkout
és
Unmanage
© IP Admin
= ITAR Admin
cIco
&
Controls the privilege to assign an object
toa project, This applies to users who
are not designated as privileged project
team members,
Note
The validation of the Assign
to project privilege in
conjunction with privileged
project membership is evaluated
based on the value of the
TC_project_validate_conditions
preference,
Controls the privilege to remove an object
from a project, This applies to users who
are not designated as privileged project
team members,
Note
The validation of the Assign
to project privilege in
conjunction with privileged
project membership is evaluated
based on the value of the
TC_project_validate_conditions
preference,
Controls the privilege to remotely check.
out an object,
Enables users to circumvent the
blocking implemented using the
TC_session_clearance preference, For
more information about session clearance,
see the Security Administration Guide
Enables users to add users to manage IP
Hcenses,
Enables users to add users to manage
ITAR licenses,
Controls checkin, checkout, transfer
checkout, and cancel checkout features
Basic tasks using Access Manager
‘Using Access Manager, you can:
PLMo020 ¢
Accees Manager Guide 1413Chapter 1 Getting started
* Create, modify, and delete rules
* Create, modify, and delete access control lists (ACLs)
* Export and import the rule tree.
For details on how to perform these tasks, see Creating and managing Access
Manager rules, Creating and managing access control lists (ACLs), and Distributing,
reverting, and repairing the rule tree.
420 Acces Manager Guide PLwo0020 ¢Chapter
PLMo020 ¢
Creating and managing Access
Manager rules
Best practices and cautionary statements 1
Understanding the rule creation process 2-9
Add an Access Manager rule 23
Modify an Access Manager rule 23
Delete an Access Manager rule 23
Reposition an Access Manager rule in the rule tree 23
Access Manager GuideChapter
Creating and managing Access
Manager rules
‘The Access Manager (AM) rule tree determines privileges on objects in the database
‘You must have system administrator privileges to modify the AM rule tree.
Best practices and cautionary statements
PLMo020 ¢
* Do not modify access control lists (ACLs) referenced by rules on the
System Objects branch.
Adding new rules, deleting rules, or in any way modifying existing rules on the
Systems Objects branch of the rule tree may result in unpredictable behavior
or loss of data,
* Do not modify the upper area of the rule tree.
Deleting or changing the order of the branches in this area of the rule tree may
result in unpredictable behavior or loss of data.
* Do not use a text editor to modify rule tree files.
Rule tree files are simple ASCII files and conform to a particular format, You
can read rule tree files using any text editor, however, modifying them with a
text editor can easily corrupt the file
* Do not use the infodba account to change object ACLs.
It is assumed that objects owned by infodba are seed parts or other special-case
objects
* Use the Has Attribute rule to create custom rules based on any attribute
of an object of a given class.
For example:
Workspacethject: object_nane=*x
PublicationRecord: security-suppliers
‘The class and attribute names are not case sensitive, The attribute type can be
string, double, integer, logical, or reference,
This rule supports custom attributes,
* Add new cules for working data in the Working Data branch of the tree.
Accese Manager Guide 24Chapter2 Creating and managing Access Manager rules
‘The proper location to add new rules for working data is under the Working
Data branch in the rule tree, This helps you customize your rule tree and
identify working data.
* Set security precedence.
‘You can embed type-level security rules under project-level security rules to give
the type-level security rules higher precedence than the project-level security
mules. For example, the project administrator can add a subbranch under the
Has Class (Form) rule entry to control access to certain form types that contain
sensitive data. The rule for the form type is written as follows
Has Class (Form)
Has Type(Finance)->finance_acl
Ifyour site requires that project-level security rules take precedence over
type-level security rules, you must embed project-level security rules under the
type-level security rules However, Siemens PLM Software does not recommend
this practice.
* Whenever possible, leave privileges unset.
Leaving privileges unset in ACLs allows rules to accomplish focused objectives,
and it also allows objects and accessors to filter through rules that do not apply
to them.
* Define relevant ACL names.
ACL names are displayed in the rule tree and in dialog boxes throughout
the Teamcenter interface. You can significantly enhance overall usability by
defining these names carefully. For example, when creating an ACL for working
data, name it according to the data type (for example, item, item revision, or
UGMASTER) rather than a role name or some other description,
Note
ACLs can be referenced in more than one rule
* Use diseretion in applying the Bypass ACL.
‘The Bypass ACL grants all privileges to system administrators who have set
the User Status Bypass button to ON. Use discretion in applying this ACL
Understanding the rule creation process
‘The basic process used to create rules is:
1. Add a rule to the tree.
2 Create and save the access control list (ACL).
3. Attach the new ACL to the rule by modifying the rule.
Tip
‘You must always save the rule or ACL after making modifications
22 AcceseManager Guide PLwo0020 ¢Creating and managing Access Manager rules
Add an Access Manager rule
1. Select the parent tree rule to which the new node will be added.
2. Set the Condition, Value, and ACL Name for the new rule.
Note
ACLs can be referenced in more than one rule.
3. Click Add.
4. Click Save.
This creates the new rule and adds it to the selected parent in the rule tree. An
asterisk appears next to the Access Manager name indicating that the application
has been modified.
Modify an Access Manager rule
1. Select the rule you want to modify.
2. Modify the condition or value in the rule pane,
3, To attach an ACL to the rule, select an ACL from the ACL Name list.
4, Click Modify =
5 Click Save W
Note
‘When you make changes to a rule, the changes are not saved until you choose
File-Save or click Save on the toolbar.
Delete an Access Manager rule
1. Select the rule you want to delete.
2. Click Delete.
3. Click Save 8
Note
Deleting a rule does not delete its corresponding ACL(s), To remove ACLs
from the rule tree, they must be explicitly deleted,
jon an Access Manager rule in the rule tree
1. Select the rule that you want to reposition.
PLMo020 ¢ Accese Manager Guide 23Chapter2 Creating and managing Access Manager rules
After selecting the rule, you can:
Click Move Up f in the toolbar to move the rule up one level in the rule tree,
* Click Move Down $ in the toolbar to move the rule down one level in the
rule tree.
3. Click Save W
24 AcceaeManager Guide PLwo0020 ¢Chapter
3. Creating and managing access
control lists (ACLs)
Create an access control list (ACL) BA
Modify an access control list (ACL)
Delete an access control list (ACL)
PLMo020 ¢ Access Manager GuideChapter
Creating and managing access
control lists (ACLs)
‘There are three types of ACLs:
© Rule tree ACL
‘These ACLs control access to general data creation. They are managed through
‘Access Manager.
© Workflow ACL
These ACLs control access to data that is in process at a particular release level.
‘They provide a subset of Access Manager functionality that can be accessed
from Workflow Designer,
* Project ACL.
These ACLs control access to project data They provide a subset of Access
‘Manager functionality that can be accessed from Project,
Create an access control list (ACL)
PLMo020 ¢
1 Enter the ACL name in the ACL Name box
Click Create “i
3. Click the Save ¥ button to the right of the ACL Name box,
4. Click Add + to add a new row to the access control entry (ACE) table.
5. Double-click the cell in the Type of Accessor column to select an accessor.
6 Double-click the cell in the ID of Accessor column to select an accessor ID.
Note
‘Some accessor types, such as User, Group, and Role, require you to select,
an accessor ID to define a specific instance of the accessor type. Other
accessor types, such as World and Owning Group, are either singular or
are relative to the object being accessed; therefore, no ID is required.
7. Set privileges by double-clicking the cell corresponding to the privilege you want
to set, and choose “to grant privileges or choose X to deny privileges.
Accese Manager Guide 34Chapters Creating and managing access control lists (ACLs)
Note
Whenever possible, do not explicitly set privileges. Leaving privileges
unset allows rules to accomplish focused objectives by allowing objects and
accessors to filter through rules that do not apply to them.
8. Click Save ¥
Modify an access control list (ACL)
1. Select the ACL you want to change from the ACL list.
Note
You cannot modify the Accessor Type or Accessor ID values, To change
these values, you must delete the entry and add a new entry that reflects
the correct accessor type and ID.
2. Modify the privileges
3. Click Save W
Delete an access control list (ACL)
1. Select the ACL you want to delete from the ACL list.
2, Click Delete ACL —
3. Click Save W
32 Access Manager Guide PLwo0020 ¢Chapter
4 Distributing, reverting, and
repairing the rule tree
Export the Access Manager rule tree 42
Import the Access Manager rule tree 42
PLMo020 ¢ Access Manager GuideChapter
PLMo020 ¢
Distributing, reverting, and
repairing the rule tree
Importing and exporting the rule tree file enables you to distribute access rules to
other Teameenter sites and also enables you to restore your local rule tree file.
Note
Rules, ACLs, accessors, and privileges that support new functionality are
introduced with each Teameenter version, Introducing new rules into your
security implementation requires analysis to determine how they should be
used.
‘You can distribute rules to other sites by first exporting the rule tree as an ASCIT
file and then importing that file at the receiving site.
Before importing a rule tree file, you must ensure schema compatibility, To
successfully load a new rule tree from a file, the importing site must have the same
types, roles, and groups as those referenced in the rule tree file, If there is any
incompatibility, the import operation is terminated at the first discrepancy and an
error message appears,
Ifyou encounter schema compatibility issues, open the rule tree file with a text
editor and either print the file or make note of the types, roles, and groups referenced
in the file, You can then use the Organization application to define the exact types,
roles, and groups at your site.
Caution
Siemens PLM Software recommends that you do not modify the rule tree file
in a text editor, as this file must conform to a particular format and can be
easily corrupted. You can use Access Manager to modify the rule tree after the
file is imported.
Reverting the rule tree to a previous version
‘You can export your access rules before making major changes to the rule tree, which
enables you to import the file if the rules need to be restored, Another method of
restoring the rule tree is to import the file that is created each time the rule tree
is saved
When you save the rule tree, a file is saved in the TC_DATA\am directory. This
file is named teee_date-time; it can be used to revert the rule tree to its state at a
specific date and time
Accese Manager Guide 44Chapter 4
Distributing reverting, and repairing the rule tree
Access Manager bypass for administrators
‘The AM_BYPASS environment variable can be used to allow administrators to
bypass Access Manager rules, This enables you to repair the rule tree in the event
that rule tree modifications have been made that render you unable to functionally
logon to Teameenter. For example, if a rule tree modification results in rendering
you unable to see your Home folder when you log on to Teameenter, you can use the
bypass privilege to log on and repair the rule tree.
Note
This environment variable should only be used when you cannot log on to
Access Manager using your standard administrative logon. It is not intended
for general rule tree maintenance.
Export the Access Manager rule tree
1. Choose File+Export
2 Enter a name for the file into which you want to export the AM rule tree data
and browse to the directory where you will store the new file.
3. Click Export
Import the Access Manager rule tree
1. Choose File—-Import
2. Lovate the ASCII file to be imported
3. Click Import
42 Access Manager Guide PLwo0020 ¢Chapter
PLMo020 ¢
Verifying the effect of access rules
View access privileges
Bl
View the rules from which privileges are derived 52
View the access control list (ACL) associated with the object 53
Access Manager GuideChapter
5 Verifying the effect of access rules
After you have implemented access rules, you should verify that the rules produce
the desired privileges for different types of accessors, You can do this by viewing the
access privileges in My Teamcenter. You can also determine which rules resulted in
a privilege being granted or denied by viewing the verdicts in the Extra Protection
dialog box.
View access privileges
1 In My Teameenter, select the object affected by the access rule and choose
View—Access.
Tip
You can also right-click the object and choose Access from the shortcut
menu or you can click { on the toolbar,
The system displays the Access dialog box, which displays the privileges
that the logged-on user has to the selected object.
2. ‘To view the privileges of a different user, choose the user, group, and role from
the lists in the Access dialog box.
‘The system displays the privileges that the selected user has to the object,
Access dialog box
Figure 5-1 shows the privileges that two users, taylor and smith, have to the
000001/A dataset, The user taylor has Write, Delete, and Change privileges to the
dataset, The user smith has Write privileges but does not have Delete or Change
privileges
PLMo020 ¢ Access Manager Guide 54Chapter Verifying the effect of access rules
Grorqouiey ch ousmousoat > cy
“be bet Ae root Grade, |
Pees ee)
oar seca
jal
a
a |
pane
a]
Q ae frweres]
co]
fet a apc
Preapaves Soc Beers aces MyommNeon cpp
Stason Shove Qe eB Pate i
Seterretannejes )seuate Sy taaten Bum
Dee Smee
oo
Figure 5-1. Viewing access privileges
View the rules from which privileges are derived
* In the Access dialog box, click
‘The system displays the Extra Protection dialog box (figure 5-2)
eGo cs
ange rues wet)
fe car ee_apayrarcn
eke 5 CT)
Pe Cnircee te) i)
AnuNonUES NS
Me Cnr ek te) i)
=m
Figure 5.2, Extra Protection dialog box
52 Accese Manager Guide PLwo0020 ¢Verifying the effect of access rules
View the access control list (ACL) associated with the object
* In the Access dialog box, click
‘The system displays the ACL Control List dialog box (figure 5-8).
rm Gi
sarcoma ce
_* FPR UE Saamaamaoaly
x.
Figure 5-3. ACL Control List dialog box
PLMo020 ¢ Accese Manager Guide 53Appendix
A Glossary
PLMo020 ¢ Access Manager GuideAppendix
A
PLMo020 ¢
Glossary
A
Access Control Entry (ACE)
In Access Manager, each pairing in the access control list of an accessor with the
granted privileges.
Access Control List (ACL)
Access Manager component that contains a list of accessors and the privileges
granted, denied, and not set for each accessor.
Accessor
Access Manager component that grants or denies privileges to clusters of users who
share certain common traits (for example, perform the same funetion or work on
the same project)
ACE
See Access Control Entry (ACE).
ACL
See Access Control List (ACL).
Approver
User who has a signoff in a workflow process regardless of role and group
membership, In Access Manager, the approver accessor is used to allocate privileges
that apply to all signoffs (for example, read access). See also RIG Approver, Role
Approver, and Group Approver.
c
Class
Set of objects that share the same list of attributes but distinguishable by the value
the attributes acquire for specific objects For example, the Automobile class can be
defined by the brand, color, and price, but each car associated to the Automobile
class has a different brand, color, and price combination.
Class Hierarchy
‘Structure defining subclasses that inherit the attributes of their superclasses, also
called their parents or ancestors,
AcceosManager Guide AAAppendix A
Glossary
D
Dataset
‘Teamcenter workspace object used to manage data files created by other software
applications Each dataset can manage multiple operating system files, and each
dataset references a dataset tool object and a dataset business object.
c
Group
Organizational grouping of users at a site, Users can belong to multiple groups
and must be assigned to a default group.
Group Administrator
User with special maintenance privileges for a group
Group Approver
User who is a signoff in a workflow process with a specific group of users. In Access
‘Manager, the group approver accessor is used in Workflow ACLs and matches the
signoff definition (that is, group) for the release level associated with the Workfiow
ACL. The group approver accessor ensures that only signoffs are given privileges, not
a. user who matches the group. See also Approver, RIG Approver, and Role Approver.
Item
Workspace object generally used to represent a product, part, or component. Items
can contain other workspace objects including other items and object folders.
Item Relation
Description of an association between a Teameenter item and a piece of information
that describes or is related to the item
Item Revision
Workspace object generally used to manage revisions to items
Item Revision Relation
Description of an association between a Teamcenter item revision and a pieve of
information that describes or is related to the item revision
Master Form
‘Teamcenter workspace object used to display product information (properties) in
a predefined template, Master forms are used to display product information in
a standardized format.
Metadata
Object description in the Teameenter database
Named ACL
Named group of access controls. See also Access Control List (ACL).
A2 Access Manager Guide PLwo0020 ¢PLMo020 ¢
Glossary
°
Object-Based Protection
Use of access control lists to create exceptions to rules-based protection on an
object-by-object basis. Object access control lists are most useful for either granting
wider access or limiting access to a specific object.
Owner
User that owns an object, initially the user who created it, Ownership can be
transferred from the owner to another user An object owner usually has privileges
that are not granted to other users (for example, the privilege to delete the object)
Owning Group
Group that owns an object, usually the group of the user creating the object. Because
users commonly share data with other members of a group, additional privileges may
be granted to the owning group (for example, the privilege to write to the object)
P
PLM XML
Siemens PLM Software format for facilitating product life cycle interoperability
using XML, PLM XML is open and based on standard W3C XML schemas
Representing a variety of product data both explicitly and via references, PLM
XML provides a lightweight, extensible, and flexible mechanism for transporting
+high-content product data over the Internet,
Privileged Team Member
Project team member with privileges to assign and remove objects from that
project. Compare with Project Team Member.
Product Structure
Hierarchy of assembly parts and component parts with a geometric relationship
between them, for example, a bill of materials (BOM), Variant and revision rules
define the generic BOM. This BOM can then be loaded to display the configured
variant,
Project
Basis for identifying a group of objects available to multiple organizations, such as
project teams, development teams, suppliers, and customers for a particular piece
of work
Project Administrator
‘Teamcenter user with privileges to administer projects using Project A Project
administrator creates, modifies, and deletes project information and team members
Project Team Administrator
Project team member with privileges to modify project information and project team
members for that project. Only one project team administrator is allowed per project,
Project Team Member
Project team member with read privileges to objects within that project, Compare
with Privileged Team Member.
Propagation
Process of transferring characteristics of one object to another object.
AcceosManager Guide ASAppendix A
Glossary
Relation
Description of an association between a Teameenter object and a piece of information
that describes or is related to the object.
RIG Approver
User who is a signoff in a workflow process with a specified role and group. In Access
‘Manager, the RIG approver accessor is used in Workflow ACLs and matches the
signoff definition (that is, role in group) for the release level associated with the
Workflow ACL. This accessor ensures that only signoffs are given privileges, not a
user who matches the role in group. See also Approver, Group Approver, and Role
Approver.
Role
Function-oriented cluster of users that models skills and/or responsibilities, The
same roles are typically found in many groups. In Access Manager, role is an accessor
used fo grant privileges to all users with the same skills and/or responsibilities,
regardless of project.
Role Approver
‘User who is a signoff in a workflow process with a specific role, In Access Manager,
the role approver accessor is used in Workflow ACLs and matches the sign-off
definition (that is, role in group) for the release level associated with the Workflow
ACL. This accessor ensures that only signoffs are given privileges, not a user who
matches the role. See also Approver, Group Approver, and RIG Approver.
Role in Group
Specific role in a specific group. In Access Manager, role in group is an accessor
used to grant privileges to all users with the same skills and/or responsibilities,
in the same group
Role in Owning Group
Specific role in the object's owning group. In Access Manager, role in owning
gfoup is an accessor used to grant privileges to users with the same skills and/or
responsibilities on the same project. For example, all designers in the owning group
are usually granted write privilege on their development data
Rules-Based Protection
Conditions or rules that control who can or cannot access objects, These rules are
global (that is, they affect the entire Teamcenter site) and are enforced by the Access
‘Manager. These rules are defined by a system administrator
Rule Tree
Access Manager component the system administrator uses to grant users access to
‘Teameenter objects. It is a tree of rules and access permissions that when processed
determines the access that each user has to a specified object.
s
system Administrator
‘Teameenter user who is a member of the system administration group,
Ad Access Manager Guide PLwo0020 ¢PLMo020 ¢
Glossary
u
User
Definition that is the mechanism by which Teameenter identifies and interacts with
each user. User definitions contain a name (derived from the person definition), user
ID, operating system name, and password.
v
Value
Content ofa field or variable. It can refer to alphabetic, numeric, or alphanumeric
data
w
Workflow
Automation of the concept that all work flows through one or more business
processes to accomplish an objective, Using workflow, documents, information, and
tasks are passed between participants during the completion ofa particular process
World
All users regardless of group or role.
AcceesManager Guide ASIndex
A
Access control lists
Vault
Working
Access Manager
‘Add rule
Basic concepts
Basic tasks
Buttons
Export rule tree
Import rule tree
Interface
Menu
Purpose
Symbols
Accessor precedence
Accessor types
Accessors
Approver
Approver Group
Approver RIG
Approver Role
Current project team
Current project teams
Group
Group administrator
Groups with security
Owner (owning user)
Owning group
Project team
Project teams
Public schedule
Remote site
Responsible party
Role
Role in group
Role in owning group
Role in project
Role in projects of object
Site
System administrator
Task owner
‘Task owning group
User
PLMn0020 ¢
1
1
1
ereeeren aes
SEES RA SASSI TATA DOR oR E EL
User Excluded
User Has Government Clearance
User Has IP Clearance
User IP Licensed
User IP Unlicensed
User ITAR Licensed
User ITAR Unlicensed
User Over Government Clearance
User Over IP Clearance
User Under Government Clearance
User Under IP Clearance
World
ACL
Adding entries
Creating
Deleting
‘Modifying
Project
Rule tree
Workflow
Adding rules
Approver
Group
RIG
Role
Assign to project privilege
Basic Access Manager concepts
Buttons
c
Change ownership privilege
Change privilege
CICO privilege
Conditions
Group Nationality
Has Attribute
Has Bypass
Has Class
Has Description
Has Form Attribute
Has Government Classification
Accees Manager Gutdc
Lis
Lis
11g
19
112
19
19
19
1-10
110
1:13
indexesindex
Has Item ID
Has Name
Has No Government Classification
Has No IP Classified
Has Object ACL
Has Status
Has Type
In Current Project
In IC Context
In Job
In Project
Inactive Sequence
Is Archived
IsGA
Is Local
Is Project Member
IsSA
Object Has IP Classification
Owning Group
Owning Group Has Security
Owning Site
Owning User
Site Location
‘User Has Government Clearance
User Has IP Clearance
User Is Bxcluded
User Is IP Licensed
User Is ITAR Licensed
User Location
User Nationality
Configuring Access Manager
Creating ACL
Current
Project team
Project teams
D
Data
In-process
Released
Working
Delete privilege
Deleting a rule
Deleting ACL
Demote privilege
Effective ACL example
Enabling Access Manager
Export privilege
Exporting the rule tree
Index2 aAsceaeManager Guide
EL GBSEBREBSEEEEREBEE
Bo
c
Group
Administrator
Group Nationality condition
Groups with security
H
Has Attribute condition
Has Bypass condition
Has Class condition
Has Description condition
Has Form Attribute condition
Has Government Classification
condition
Has Item ID condition
Has Name condition
Has No Government Classification
condition
Has No IP Classified condition
Has Object ACL condition
Has Status condition
Has Type condition
Import privilege
Importing a rule tree
Importing the rule tree
In Current Project condition
In IC Context condition
In Job condition
In Project condition
Inactive Sequence condition
InAnySchedule
InSchedule
IP Admin privilege
Is Archived condition
Is GA condition
Is Local condition
Is Project Member condition
Is SA condition
ITAR Admin privilege
M
Menus
Modifying ACL
Moving a rule
°
Object Has IP Classification condition
Te ee ee gg
114
PLMo0020Object-based protection
Owner (owning user)
Owning group
Owning Group condition
Owning Group Has Security
condition
Owning Site condition
Owning User condition
P
Prerequisites for Access Manager
Privileges
Assign to project
Change
Change ownership
cco
Delete
Demote
Export
Import
IP Admin
TTAR Admin
Promote
Publish
Read
Remote checkout
Remove from project
Subscribe
‘Transfer in
‘Transfer out
‘Unmanage
Write
Write Classification ICO
Project
‘Team
‘Teams
Project ACL
Promote privilege
Protecting Teameenter data
Public schedule
Publish privilege
R
Read privilege
Remote checkout privilege
‘Remote site
Remove from project privilege
Responsible party
Restoring the rule tree
Reverting the rule tree
Role
In group
In owning group
PLMn0020 ¢
Bb bik
S
Index
In project,
In projects of object
TnAnySchedule
InSchedule
Rule tree
Conditions
Exporting
Importing
Restoring
Reverting to previous version
Rule tree ACL.
Rule tree precedence
Rules
Adding
Definition
Deleting
Modifying
‘Moving
Subbranch precedence
Syntax
Tree
Rules-based protection
s
Site 116
Site Location condition 113
Starting Access Manager 11
Subscribe privilege za
System administrator 116
T
Task owner 116
Task owning group 116
Transfer in privilege Lis
‘Transfer out privilege Lis
u
Unmanage privilege
User
User Excluded
User Has Government Clearance
User Has Government Clearance
condition
User Has IP Clearance
User Has IP Clearance condition
User IP Licensed
User IP Unlicensed
User Is Excluded condition
User Is IP Licensed condition
User Is ITAR Licensed condition
User ITAR Licensed
User ITAR Unlicensed
Accees Manager Guide indax-3index
User Location condition
User Nationality condition
User Over Government Clearance
User Over IP Clearance
User Under Government Clearance
User Under IP Clearance
v
‘Vault ACL.
Index asceee Manager Guide
w
Workflow ACL,
Working ACL
World
Write Classification ICO privilege
Write privilege
PLwo0020 ¢
Common questions Powered by AI The rule tree functions as a decision-making filter by evaluating the applicable rules from the top of the tree downwards. When a user attempts to access data, the system processes the conditions, values, and ACLs based on their hierarchical placement. This procedural filtering determines which rules provide effective ACLs, thereby granting or denying certain privileges based on current rule conditions and precedence .
Rules-based protection in Teamcenter controls data access by applying conditions and values to determine privilege allocation using an Access Control List (ACL). The condition and value part of a rule form an IF clause, while the ACL forms the THEN clause. This logical setup allows attributes like user ID and session context to define user access. A rule tree hierarchy is utilized where rules at higher tree levels have broader applicability, with subbranches taking precedence over parent branches .
Using subbranches in a rule tree is beneficial for customizing access controls by giving specific rule sets higher precedence over their parent branches. This is particularly useful when managing specialized data types or projects that require distinct access privileges, such as controlling access to sensitive information or delineating security boundaries between projects .
Using an object's ACL to introduce exceptions allows users with change privileges to refine or override global access rules for specific objects. This capability provides flexibility in access management by permitting case-based adjustments to access rules, thereby accommodating unique requirements or responding to special circumstances that global rules might not address effectively .
Siemens PLM Software advises against giving project-level security rules precedence over type-level rules because it can compromise the specific and targeted security controls that type-level rules offer. Type-level rules are designed to apply precisely to the data types they govern, providing granular control that can be diluted when overridden by broader project-level rules .
In Teamcenter, both rule precedence within the rule tree and accessor precedence within an ACL are considered during access privilege evaluation. Rule precedence is determined top-down within the tree, granting higher priority to rules placed higher within the hierarchy. Simultaneously, the order of accessors in an ACL affects privilege allocation, where predefined accessor ranks influence final access permissions .
Defining relevant ACL names significantly enhances usability within the Teamcenter interface. Well-named ACLs can improve user navigation and understanding by clearly representing the function or data type they regulate, such as distinguishing between item types or security levels. This clarity reduces confusion and aids in the efficient management and application of security protocols .
Best practices suggest leaving privileges unset in Access Control Lists (ACLs) to streamline rule objectives and facilitate the filtering of rules that do not apply to specific objects or accessors. This approach provides greater flexibility in access management, allowing objects and accessors to pass through non-applicable rules without unnecessary restrictions .
The standard process for creating access manager rules involves selecting the parent node in the rule tree, setting condition, value, and ACL name for the new rule, followed by saving the rule. The process requires careful attachment of ACLs to rules and routine saving of modifications to ensure that changes are effectively integrated into the rule tree .
The 'Bypass' ACL grants all privileges to system administrators who have activated the User Status Bypass. Its application should be discreet because excessive use might inadvertently compromise data security by allowing broad and unchecked access, undermining the protective measures established by more specific ACLs .