How to Configure Security for Sources

Follow steps in this procedure to configure permissions to sources for users or groups.

To begin configuring source security, start by assigning the desired source permissions for the All Sources group. To view sources in the tree, users or user groups must be assigned the Allow user to view the Source permission in the All Sources group. Users not assigned this permission in the All Sources group will not see any sources or groups even though they may have been given permissions for the specific source or group.

Output Manager security for the Sources application begins at the root of the Sources tree, the All Sources group. The Sources tree consists of sources and source groups. A source is an input into Output Manager. A source group is a way to organize sources. Output Manager security is provided for both by adding a Microsoft Windows user or user group to the source or source group and assigning permissions to that user or user group. These Output Manager permissions define the type of access users and user groups have to the sources and source groups. Once the Output Manager security (Microsoft Windows users, user groups, and source permissions) is set in a source group, the Output Manager security is inherited by all the objects in that source group. When a new source or source group is created, its security is automatically the same as its parent source group’s security (that is, the new source inherits its security from its parent source group).

  1. In the Output Manager Console, select the Sources application in the navigation pane.
  2. In the Sources tree, right-click a source or source group and click Security.
    To perform this step, a user must be a member of the local Administrators group or be assigned the Allow user to modify the Source's security configuration permission. Users with this permission can add and remove users or groups and modify assigned permissions.
    Completing this step opens the Security Configuration dialog box. To access this dialog box,
    Security Configuration dialog box
  3. Use the Inherit permissions from the parent option to inherit permissions from a parent group or to remove inheritance.
    • Click the browse button (...) to select a new parent group for inheritance or to remove inheritance.
    By default, sources are configured to inherit permissions from the parent folder.
    Tip: It is a recommended practice to assign rights using inheritance, as it allows administrators to easily assign and manage permissions. Blocking inheritance is useful when a source or source group needs to be seen by just a few users. If you plan to block inheritance, make sure the users that need access to the blocked source or group are in the security settings for all of its parent groups, including All Sources. If this is not done then those users will not be able to see the source. Also remember to remove the users and user groups that should not have access to the source or group.
  4. In the Users and groups with permissions box, select a user or group to manage.
    The Assigned permissions list box displays permissions that are currently granted to the selected user or group.
  5. In the Assigned permissions box, select or clear check boxes to grant or revoke permissions for the selected user or group.
    • You can click Select All or Unselect All to quickly grant or revoke all permissions.
    The permissions assigned to a source group will be inherited for all of the objects contained in that group, except for the ones that have inheritance blocked.

    If you notice permissions that are selected and disabled, then the user/group selected has inherited permissions. Inherited permissions cannot be removed. To remove inherited permissions, you must first block inheritance for the source.

  6. When you are finished configuring security, click OK to save your changes.