02.05.2013 Views

User Guide - Mks.com

User Guide - Mks.com

User Guide - Mks.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Understanding<br />

Access Control<br />

Lists<br />

Before You Start the Integrity Client<br />

To view project permissions in the graphical user interface<br />

Do one of the following:<br />

From a Project view, select Project > Properties > Project Permissions.<br />

From a Sandbox view, select Sandbox > Properties > Project<br />

Permissions.<br />

The Project Permissions dialog box opens and displays the assigned access<br />

permissions for the selected project.<br />

To view member permissions in the graphical user interface<br />

From a Project or Sandbox view, select Member > Properties > Member<br />

Permissions.<br />

The Member Permissions dialog box opens and displays the assigned<br />

access permissions for the selected member.<br />

If you find you are unable to perform necessary operations, you must<br />

contact the administrator responsible for Source Integrity at your site to<br />

review the permissions assigned to you. For example, if you are unable to<br />

create a new project, it may mean that you have not been assigned the<br />

required permissions for this operation.<br />

IMPORTANT<br />

If your administrator has assigned you a new set of permissions, you must<br />

update your permissions by disconnecting your Source Integrity client and<br />

then reconnecting to the Integrity Server. An out-of-date permission set may<br />

cause unpredictable behavior when attempting to open projects or perform<br />

other tasks. To disconnect from the server, see “Logging Out of Source<br />

Integrity” on page 72.<br />

An Access Control List (ACL) is a collection of entries that permits or limits<br />

entry to the functionality of a software program or server. The Access<br />

Control List allows the administrator to manage user access by requiring<br />

authentication of the user’s identity or membership in a predefined group.<br />

Access is then granted according to the assigned permissions. Access<br />

Control Lists (ACLs) store security, configuration, and administrative<br />

information for the Integrity Server and Source Integrity. They work in<br />

conjunction with your network’s authentication system to provide control<br />

over features and functions.<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!