No. The other criteria are used to find the record but any value of the entry ID field is ignored when it is setting all the field values (unless it is a new record in which case the entry ID is used based on the criteria you specify in the merge operation – create a new, retain old.
Doug Mueller From: Action Request System discussion list(ARSList) [mailto:[email protected]] On Behalf Of Jason Miller Sent: Friday, April 10, 2015 1:01 PM To: [email protected] Subject: Re: Row - level permissions ** Purely from a academic point of view, can the value of field 1 be change by a merge operation? For example importing an arx and using another field to identify a match. I haven't tried but was just wondering if that is an exception where the value can be changed. On Fri, Apr 10, 2015 at 11:26 AM, Mueller, Doug <[email protected]<mailto:[email protected]>> wrote: ** Just to confirm what has been discussed here. For row level security, having access to field 1 simply makes that row visible to the user. Whether the permission setting is view or change is not important and not considered and not significant to row level security. Just that you have access so you can see the row. You then need to have appropriate permissions to fields where you can define that some fields are accessible and others are not even if you can see the row and you can separately control read and change access to each field. It has ALWAYS been this way. Permissions of a field are for that field. Row level security and access to field 1 are simply controlling whether you can see a record, not what fields you can see or whether you can view or change them. About what does view or change access to field 1 mean? Well, there is no difference. Field 1 is a field you cannot change at the system level. So, giving it change access is really meaningless. Rather than have a special handling and special functionality and messing up the ability to bulk set field permissions and the like, we take the approach of “a field is a field” and you can define whatever permission you want. Then, there may be other things that control or limit or manage the permissions. So, for field 1, if you say change, we just ignore that and don’t allow the change. Or for some other field, you could say change is allowed, but have workflow that prevents changes. The idea is to have consistency of definitions and capabilities and then to have special limits rather than try and encode all the special limits that may exist in all interfaces and interactions. So, this note is just to confirm the responses that have been given about this topic and to address the final question about what Change access to field 1 means and why it is allowed to be set. Doug Mueller From: Action Request System discussion list(ARSList) [mailto:[email protected]<mailto:[email protected]>] On Behalf Of LJ LongWing Sent: Friday, April 10, 2015 11:17 AM To: [email protected]<mailto:[email protected]> Subject: Re: Row - level permissions ** Kanhu, Row Level Security is exactly that, by assigning permissions to field 1, you are defining who has access to a row...it's not limited to submitter/assignee, it's any group that you want to be able to see the row, this includes implicit/regular/dynamic/etc Yes...if they have a 'write' license, and access to the form/row, AND they have change access to a field they can modify a record/field. Now...in Andrew's situation, he asked for group_a to be able to change, but group_b he wanted to only be able to create, and view. So, what he needs to do is Set 'allow any user to submit' to yes, thus allowing all users to create records He then needs to set A as a change user on all fields and B as a view user on all fields That should provide him with his requirements....row level permissions don't define an ability to view/change a record, only 'view' a record. On Fri, Apr 10, 2015 at 12:05 PM, kanhu mohapatra <[email protected]<mailto:[email protected]>> wrote: ** Hello Folks, What I understood, Row level security is, only submitter and assignee can able to see and modify request they created and assigned respectively. I.e at database level a single row which is a request in ARS. So I may have been wrong on submitter mode. But if user have fixed or floating license they can modify ticket, if they have permission on fields and of course on the form. So in Andy use case, user of both group have access to the form and fields And also allow all user to submit, if yes. We are explicitly allowing any use to submit. So I believe it should be No. And I would request all folks correct me if I am wrong. Best regards, Kanhu. On Apr 10, 2015 11:07 PM, "Andrew Hicox" <[email protected]<mailto:[email protected]>> wrote: ** Thanks everyone! I was aware of "allow any user to submit" (in fact was using this feature, which may have contributed confusion). We're using locked submitter mode, but I don't think that applies here ... we're not using assignee perms at all on this form, but are using assignee group. I guess I just misunderstood the functionality. Since you can set change perm on field 1, I just presumed that's what it was for, and I guess I must have gotten randomly lucky all these years that other access control methods must have handled business for me. So on that note: why can I set change permission on field 1? What does that mean, if not "let members of this group write to the record?" ... - Andy On Apr 10, 2015 12:23 PM, "kanhu mohapatra" <[email protected]<mailto:[email protected]>> wrote: ** Hello Andrew, Can you please check the "Submitter Mode" whether it is locked or changeable. Row level security depends upon this value keep the value to locked and also give field 1 to submitter and assigne group permission and check Best regards, Kanhu. On Apr 10, 2015 10:32 PM, "Lucero, Michelle" <[email protected]<mailto:[email protected]>> wrote: ** Hi, Andrew: One more thing. In your sample form, are any of the implicit groups listed as having write permission? For Example: • Public • Submitter • Assignee • Assignee Group For Advanced Interface forms we build for SRM, we assign Submitter write permission to everything. For more information about row-level permission, read Controlling access by using implicit groups--Row-level security<https://docs.bmc.com/docs/display/public/ars201401/Controlling+access+by+using+implicit+groups--Row-level+security;jsessionid=59EE45C5A6391DFCCC99E804A01A6D4A> It also includes info about using dynamic groups. Hope this helps, Michelle From: Action Request System discussion list(ARSList) [mailto:[email protected]<mailto:[email protected]>] On Behalf Of Andrew Hicox Sent: Friday, April 10, 2015 11:37 AM To: [email protected]<mailto:[email protected]> Subject: Re: Row - level permissions ** Good grief! Has it always been this way or have I just misunderstood the feature this whole time? I could swear you used to be able revoke row-level write access by setting assignee group write on field 1 then changing the assignee group. Thanks again, everyone Andy On Apr 10, 2015 11:34 AM, "Jason Miller" <[email protected]<mailto:[email protected]>> wrote: ** Correct, view vs. change permission on field 1 does not have an impact on other fields or the records as a whole. All field will need their permissions individually set to view or change. Fortunately this is pretty easy to do with multiple fields at once in Dev Studio. Jason On Fri, Apr 10, 2015 at 9:26 AM, Andrew Hicox <[email protected]<mailto:[email protected]>> wrote: ** This is not related to multi-tennancy, in the ITSM sense of the term (multiple companies). This is simply row-level access on a form. My (probably inaccurate) understanding, was that setting or revoking change perms for a given group on field 1 set or revoked change permission to that record. As far as I can tell, setting change permission on field 1 is meaningless? I can find nary a mention of setting change perms on field 1 in the documentation for 8.1 (which is what I'm using). Can someone confirm? Thanks, Andy On Apr 10, 2015 11:17 AM, "Raj" <[email protected]<mailto:[email protected]>> wrote: ** Well, I believe what we are talking about is multi-tenancy and multi-tenancy means if a particular user can “see” the data or not – not related to whether the user can modify the data or not. Request Id is not something that end user can modify, well, not unless one turns naughty.. at least that’s the way I see it. Thoughts? -Raj From: Andrew Hicox [via ARS (Action Request System)] [mailto:ml-node+<mailto:ml-node%2B>[hidden email]<http://user/SendEmail.jtp?type=node&node=121312&i=0>] Sent: Friday, April 10, 2015 21:19 To: Hiremath, Raj Subject: Row - level permissions ** I feel like a real dummy asking this question, because it's so basic. My understanding of row - level permissions up to now has been that it is controlled via permissions on field 1 (request id). If a group has read permission, that group can view the request, but not change it. If the group has change access, the group can change the record (presuming the user has access to all of the individual fields they try to change). However, this does not appear to be the case. I created two groups: * group_a * group_b I created two users: * scoob (member of group_a) * shaggy (member of group_b) I created a regular form where group_a and group_b have change permission on all fields, except 'Request ID'. On 'Request ID', group_a has change and group_b has view. So .. I thought shaggy should be able to submit, but not modify. However that's not the case. Shaggy can both submit and modify! So ... ARS seems to only check row level access in a binary manner. You have access or you dont, and write access is controlled at the field level? If this is the case, what does setting change permission on the Request ID signify? Either I've been seriously confused about how this works for the past 18 years, and it's just never been an issue, or maybe something changed along the way ... I dunno. Any comments y'all? -Andy _ARSlist: "Where the Answers Are" and have been for 20 years_ ________________________________ If you reply to this email, your message will be added to the discussion below: http://ars-action-request-system.1.n7.nabble.com/Row-level-permissions-tp121311.html To start a new topic under ARS (Action Request System), email [hidden email]<http://user/SendEmail.jtp?type=node&node=121312&i=1> To unsubscribe from ARS (Action Request System), click here. NAML<http://ars-action-request-system.1.n7.nabble.com/template/NamlServlet.jtp?macro=macro_viewer&id=instant_html%21nabble%3Aemail.naml&base=nabble.naml.namespaces.BasicNamespace-nabble.view.web.template.NabbleNamespace-nabble.view.web.template.NodeNamespace&breadcrumbs=notify_subscribers%21nabble%3Aemail.naml-instant_emails%21nabble%3Aemail.naml-send_instant_email%21nabble%3Aemail.naml> -rAJ ________________________________ View this message in context: RE: Row - level permissions<http://ars-action-request-system.1.n7.nabble.com/Row-level-permissions-tp121311p121312.html> Sent from the ARS (Action Request System) mailing list archive<http://ars-action-request-system.1.n7.nabble.com/> at Nabble.com. _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ ________________________________ This message, and any attachments, is for the intended recipient(s) only, may contain information that is privileged, confidential and/or proprietary and subject to important terms and conditions available at http://www.bankofamerica.com/emaildisclaimer. If you are not the intended recipient, please delete this message. _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the Answers Are, and have been for 20 years"

