Security reports overview
Security reports provide information about roles and privileges defined with the Deployment Automation security system.
To manage security reports, navigate to Administration > Reports. On the Reports page, you can export the selected reports, which saves them as a spreadsheet to your machine.
Application Security report
The Application Security report provides information about user and group roles and privileges defined for Deployment Automation-managed applications.
Each report listing represents an individual application. When selected, the report runs automatically for all applications.
The following table describes the application security fields:
Field | Description |
---|---|
Application | Name of the application. |
Clean Execution History | Users and groups who have privileges to clean execution history. For details, see Manage deployment history. |
Execute | Users and groups who have application execution privileges. |
Manage Snapshots | Users and groups who have snapshot management privileges. For details about snapshots, see Snapshots. |
Read | Users and groups who can review information about the application but not change it. |
Run Component Processes | Users and groups who have component process execution privileges. |
Security | Users and groups who can define privileges for other users and groups. |
Write | Users and groups who can access and edit the application. |
Component Security report
The Component Security report provides information about user and group roles and privileges defined for components.
Each report listing represents an individual component. When selected, the report runs automatically for all components.
The following table describes the component security fields:
Field | Description |
---|---|
Component | Name of the component. |
Execute | Users and groups who have component process execution privileges. |
Security | Users and groups who can define privileges for other users and groups. |
Read | Users and groups who can review information about the component but not change it. |
Write | Users and groups who can access and edit the component. |
Environment Security report
The Environment Security report provides information about user and group roles and privileges defined for environments.
Each report listing represents an individual environment. When selected, the report runs automatically for all environments.
The following table describes the environment security fields:
Field | Description |
---|---|
Application | Name of the application. |
Clean Execution History | Users and groups who have privileges to clean execution history. For details, see Manage deployment history. |
Environment | Name of the environment. |
Execute | Users and groups who have execution privileges for the environment. |
Security | Users and groups who can define privileges for other users and groups. |
Read | Users and groups who can review information about the environment (but not change it). |
Write | Users and groups who can access and edit the environment. |
Resource Security report
The Resource Security report provides information about user and group roles and privileges defined for resources.
Each report listing represents an individual resource. When selected, the report runs automatically for all resources.
The following table describes the resource security fields:
Field | Description |
---|---|
Resource | Name of the resource. |
Execute | Users and groups who have execution privileges for the resource. |
Security | Users and groups who can define privileges for other users and groups. |
Read | Users and groups who can review information about the resource but not change it. |
Write | Users and groups who can access and edit the resource. |
See also: