You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

SeRP provides a default set of user roles with assigned relevant permissions for each project. However, should you wish to amend these permissions, you can create a new user role type or you can assign additional permissions to exist role types.



Permissions can be amended by selecting "Create New Permission" > providing a description > selecting the relevant "Aspect" (For a breakdown of each aspect, see the table below) > select the type of "rights" you wish to assign (again, see the table below) > click "Create"


Aspect

Type

Description

NRDA




R

Access to the Data Catalogue for a project

RW

Create datasets and import files etc.

Execute

RW + Publish Data

Security

Access S3 and create subprojects.

SQL

R

Read Only access to the SeRP SQL Server (if allocated to the tenancy)

RW

Read/Write access to the SeRP SQL Server(if allocated to the tenancy)

PostGreSQL

R

Read Only access to the SeRP PostGreSQL Server (if allocated to the tenancy)

RW

Read/Write access to the SeRP PostGreSQL Server (if allocated to the tenancy)

FILE

R

Read Only access to the file store

RW

Read/Write access to the file store

DataApproval

RW

Enable user to be able to perform data in/out approval for this project

LocalShare

RW

Ability to read/write to a LocalShare to support ingress of data from within a network.

NLP

RW

Not in use – yet!

DB2

R

Read Only access to the SeRP DB2Database (if allocated to the tenancy)

RW

Read/Write access to the SeRP DB2 database (if allocated to the tenancy)

GIT

RW

Ability to write to the GIT group within the SeRP for this project.

Ingress

R

Ability to read from an SFTP store (if made available to the tenancy)


RW

Ability to read/write from an SFTP store (if made available to the tenancy)

Administrative Level Access

Super User

  • Ability to create users and have ability to perform administrative responsibilities for the programme hierarchy

Mega Super User

  • Ability to perform force re-provisions
  • No labels