Enabling Users to Create Requests

You can use the User Access tab in the Request Type window to determine which users can create requests of a specific request type. You can enable all users with required access grants to create a specific request type, or enable only certain users to create requests of a specific type.

The User Access tab can include multiple lines that grant access to create or process the requests. A user who meets any of the requirements listed on the tab can perform that action in the request.

To enable all users to create and submit a specific request type:

  1. Log on to PPM.

  2. From the menu bar, select Open > Administration > Open Workbench.

    The PPM Workbench opens.

  3. From the shortcut bar, select Demand Mgmt > Request Types.

    The Request Type Workbench opens.

  4. Click List.

    The Results tab lists all existing request types.

  5. Double-click the row that displays the request type that you want all users to be able to create.

  6. Click the User Access tab.

  7. In the All Users row, select the Create checkbox.

  8. Click Save.

To enable only members of a specific security group to create requests of a specific type:

  1. On the User Access tab, in the All Users row, clear the Create checkbox.

  2. Click New.

    The Participant Security window opens.

  3. In the list at the top of the window, leave Enter a Security Group Name selected.

  4. In the Security Group field, provide the name of the security group that you want to enable to create requests of the selected type.

  5. Click OK.

    The User Access tab now lists the selected security group.

  6. Click Save.

To enable specific users to create a request:

  1. On the User Access tab, in the All Users row, clear the Create checkbox.

  2. Click New.

    The Participant Security window opens.

  3. In the list at the top of the dialog box, select one of the following items:

    • Enter a Username. Restricts request access to the users you specify.

    • Enter a Standard Token. Control request security dynamically, depending on the value in a standard field. Select from a list of system tokens that correspond to a user or security group.

    • Enter a User Defined Token. Control request security dynamically, depending on the value in a custom field. Select any field token that corresponds to a user or security group.

  4. In the field, which is labeled Username, Standard Token, or User Defined Token, provide one or more values (usernames or tokens).

  5. Click OK.

    The User Access tab now lists the items you specified.

  6. Click Save.