Security reports overview

Security reports provide information about roles and privileges defined with the Deployment Automation security system.

To manage security reports, navigate to Administration > Reports. On the Reports page, you can export the selected reports, which saves them as a spreadsheet to your machine.

Application Security report

The Application Security report provides information about user and group roles and privileges defined for Deployment Automation-managed applications.

Each report listing represents an individual application. When selected, the report runs automatically for all applications.

The following table describes the application security fields:

Field Description
Application Name of the application.
Clean Execution History Users and groups who have privileges to clean execution history. For details, see Manage deployment history.
Execute Users and groups who have application execution privileges.
Manage Snapshots Users and groups who have snapshot management privileges. For details about snapshots, see Snapshots.
Read Users and groups who can review information about the application but not change it.
Run Component Processes Users and groups who have component process execution privileges.
Security Users and groups who can define privileges for other users and groups.
Write Users and groups who can access and edit the application.

Back to top

Component Security report

The Component Security report provides information about user and group roles and privileges defined for components.

Each report listing represents an individual component. When selected, the report runs automatically for all components.

The following table describes the component security fields:

Field Description
Component Name of the component.
Execute Users and groups who have component process execution privileges.
Security Users and groups who can define privileges for other users and groups.
Read Users and groups who can review information about the component but not change it.
Write Users and groups who can access and edit the component.

Back to top

Environment Security report

The Environment Security report provides information about user and group roles and privileges defined for environments.

Each report listing represents an individual environment. When selected, the report runs automatically for all environments.

The following table describes the environment security fields:

Field Description
Application Name of the application.
Clean Execution History Users and groups who have privileges to clean execution history. For details, see Manage deployment history.
Environment Name of the environment.
Execute Users and groups who have execution privileges for the environment.
Security Users and groups who can define privileges for other users and groups.
Read Users and groups who can review information about the environment (but not change it).
Write Users and groups who can access and edit the environment.

Back to top

Resource Security report

The Resource Security report provides information about user and group roles and privileges defined for resources.

Each report listing represents an individual resource. When selected, the report runs automatically for all resources.

The following table describes the resource security fields:

Field Description
Resource Name of the resource.
Execute Users and groups who have execution privileges for the resource.
Security Users and groups who can define privileges for other users and groups.
Read Users and groups who can review information about the resource but not change it.
Write Users and groups who can access and edit the resource.

Back to top

See also: