05-20-2016 10:52 AM - edited 03-01-2019 09:22 AM
We are trying to setup a Security policy that will allow a 3rd party vendor to view the schedule and only re-run jobs that fail. When we setup the security policy this way the Rerun option is grayed out. Not sure what we are missing, Would someone be able to help?
Category | Functions Assigned |
Agent Lists | View |
Alerts | View |
Connections | View |
Email Events | View |
General | Logs,Reports,History, Status |
Job Actions | View |
Job Classes | View |
Job Console | View All |
Job Control | Rerun |
Job Events | View |
Jobs | View |
PeopleSoft Jobs | View |
Queues | View |
System Events | View |
Variable Events | View |
Variables | View |
Virtual Resources | View |
Solved! Go to Solution.
05-20-2016 04:18 PM
Hi Thomas,
In addition to the View All under the job console, there are other options to elect: Control Own which allows owners to control their own jobs such as a re-run, or Control All to control jobs owned by others as well as their own jobs.
Regards,
Derrick Au
05-20-2016 12:20 PM
Security / Tidal / Jobs and Groups - great subject Thomas.
I don't believe Cisco pushes the subject far enough.
Our implementation originally managed the tool as a centralized piece of software, where only a limited number of staff used the tool, and they used it everyday. We're now trying to invert that model and its roles, out to the true development staff and it's been 'trying' to prove the roles out to allow this to happen.
That's as far as Cisco goes with explaining the concept, (unless you want to read thru a zillion pages of elementary Tidal feature sets and then connect all of the dots to get what you need out of it)
But more importantly, Cisco should be leading the path for those customers where this software is their meat and potatoes and not sending people to their consulting group
I've found that my none-superuser ID can have a high level of security assigned to it for a group then the base set of permissions for that user ID. Aka, the user should be only able to do X & Y but not Z, they can do Z.
Secondly, they can 'see' other groups of jobs that they shouldn't be a member of, which goes back to point #2.
I can't explain this one, what so ever, except that its sounding like either I've been told something incorrectly, or the group membership has a hole in its query/filter to allow other Tidal objects be viewed where they shouldn't be. Either better QA @ Cisco for the tool, or better communications of their design intentions. IDK...
My third beef, we place credentials in Tidal variables for sending to Tidal jobs in the parameter fields of Tidal jobs.
In the definition section, the variable value just shows up as <somevalue.name.49> instead of its real content. In the Job Activity section, if the job hasn't executed, those values don't appear, but once a job executes, the Tidal variables are plain as daylight to the Tidal user in the 'Override' tab of the job for that day.*
*-An easy patch to resolve that, might be to create a job property, that would say if checked "Don't show Tidal variables in the Job Activity section". If left unchecked, continue the current manner of exposing those values in the Job Activity 'Override' tab.
Good luck, but first, make double sure that ALL the ownerships line up, then go from there.
05-20-2016 12:22 PM
Thanks Dave, I'll keep digging into the issue.
05-20-2016 04:18 PM
Hi Thomas,
In addition to the View All under the job console, there are other options to elect: Control Own which allows owners to control their own jobs such as a re-run, or Control All to control jobs owned by others as well as their own jobs.
Regards,
Derrick Au
05-23-2016 07:37 AM
Derrick
Thanks for providing the answer to my issue.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide