Page tree

Skip to end of metadata
Go to start of metadata

In addition to assigning users to permission groups (see Assigning Users to Permission Groups), you can also grant access to Development Testing Platform functionality to users on an individual basis.

  1. Open a user's profile page; see Editing a User.
  2. Click the Permissions & Groups tab.
  3. Choose a functionality from the Tool drop-down list.
  4. Choose a permission setting from the Name drop-down list that describes the range of permissions to grant.
  5. Choose true or false from the Value drop-down box to grant or deny access to the tool.
  6. Click Add to finish the configuration. You can also click the remove button (x) to remove native permissions.
  7. Click Save to add native permissions.

Permissions

The following tables describe permissions available in DTP.

PST Permissions

Permission NameValueDescription
basicAccess

true

false

Required to login, but additional permissions are necessary to specify what DTP features the user can access.
administration

true

false

Grants access to the Development Testing Platform Control Center so that the user can deploy and manage DTP applications.

PSTSEC Permissions

Permission NamePossible ValuesDescription
basicAccess

true

false

Required to login to the Development Testing Platform Security application (User Administration component). Provides ability to modify one's own personal data, but no one else’s.
administration

true

false

Grants right to edit and modify user and permission groups data.

GRS Permissions

Permission NamePossible ValuesDescription
basicAccess

true

false

Required to login to Report Center, but additional permissions are necessary to specify which features the user can access.
administration

true

false

Grants access to Report Center administration pages
project

[project name]

regex pattern

Grants access to the data associated with a specific project. You can use a regular expression to grant access to related projects. For example, if grs:project:Core provides access to a project called Core, you can use the regular expression grs:project:Core \d\.\d to provide access to Core 1.0, Core 1.1, etc. projects.
prioritizeAll

[project name]

regex pattern

Enables the user to set the priority of violations associated with the project. Team default permission: Leader (leader inherits permissions from member)

prioritizeOwner

[project name]

regex pattern

Enables the user to set the priority of violations assigned to the user.
viewSourceCode

[project name]

regex pattern

Enables the ability to view source code associated with the project.Team default permission: Member.
testSessionStatusChange

[status value to status value]

regex pattern

Specifies what status transitions can be made for test sessions in Project Center (strict mode only). See “Controlling Permissions and Status Transitions with Strict Mode” in the Project Center documentation for additional information.

reqStatusChange

[status value to status value]

regex pattern

Specifies what status transitions can be made when working with requirements in Project Center (strict mode only). See “Controlling Permissions and Status Transitions with Strict Mode” in the Project Center documentation for additional information.
defectStatusChange

[status value to status value]

regex pattern

Specifies what status transitions can be made when working with defects in Project Center (strict mode only). See “Controlling Permissions and Status Transitions with Strict Mode” in the Project Center documentation for additional information.
testStatusChange

[status value to status value]

regex pattern

Specifies what status transitions can be made when working with tests in Project Center (strict mode only). See “Controlling Permissions and Status Transitions with Strict Mode” in the Project Center documentation for additional information.
scenarioDeleteRestore

[status value to status value]

regex pattern

Enables users to delete and restore test scenarios in Project Center (strict mode only). See “Controlling Permissions and Status Transitions with Strict Mode” in the Project Center documentation for additional information.
scenarioStatusChange

[status value to status value]

regex pattern

Specifies what status transitions can be made when working with test scenarios in Project Center (strict mode only). See “Controlling Permissions and Status Transitions with Strict Mode” in the Project Center documentation for additional information.

LS Permissions

Permission NamePossible ValuesDescription
basicAccess

true

false

Grants access to view License Server configuration pages.
administration

true

false

Grants access to License Server administration pages to manage licenses (add, remove, reserved, and so on).

TCM Permissions

Permission NamePossible ValuesDescription
basicAccess

true

false

Grants access to view Team Server configurations.
administration

true

false

Grants access to Team Server administration pages to manage stored data, such as grant/limit access to Team Server data, created sandboxes, and load test configuration.

EM Permissions

Permission NamePossible ValuesDescription
role

administration

Grants access to all Environment Manager activities: testing privileges, provisioning environments, defining systems and environments, controlling access permissions, and test data management. See the Environment Manager User Guide for additional information.
rolesystemGrants the ability to provision environments and to create and execute test jobs in Environment Manager. Appropriate permissions to the resources is required for both actions. This role also grants the ability to execute all repository actions on test data. See the Environment Manager User Guide for additional information.
roleprovisionGrants the ability to provision environments for sources the user has access to in Environment Manager. This role also grants read-only access to test data. See the Environment Manager User Guide for additional information.
  • No labels