No explicit administrative action is needed to enable the Access Control List feature. This feature is always available in the SIMULIA Execution Engine once you have enabled security. The ACL feature should, however, be configured as described in this section to achieve the level of default permissions as required by the organization. This feature is not useful if each user cannot be distinguished and authenticated. Thus, the client authentication capability of SIMULIA Execution Engine is a prerequisite for using Access Control Lists. The following permission levels are available:
For instructions on how to apply these permissions to library data and jobs, see Setting Default Permissions in the Isight User’s Guide. An ACL system administrator can define new groups, add and remove users from groups, define default system-wide permissions, and add and remove other ACL system administrators. The Dashboard is used by the ACL system administrator to configure the ACL system settings. For more information on this interface, see Using the Dashboard. The ACL system administrator should then use the Dashboard's Access Control tab to define the system-wide default permission settings. This tab is shown in the following figure.
Only an ACL system administrator will see the Access Control
tab on the Dashboard. When the SIMULIA Execution Engine
is first installed, the only users who are considered ACL system administrators
are those who have been assigned the The System Default subtab defines the permissions that will be applied to any object (model, component, job) that has no explicit permission for the requesting user. For the most secure system, the System Default tab should have All other users set to NONE. This action will prevent access by any user to any data to which they are not otherwise given explicit permission to use. Setting this value to ALTER will give all users access to all data unless the author of the data explicitly prevents it. |