Network Deployment (Distributed operating systems), v8.0 > Reference > Sets


Map RunAs roles to users collection for SCA composites

Use this page to map a specified user identity and password to a RunAs role for a Service Component Architecture (SCA) composite. This page enables you to specify application-specific privileges for individual users to run specific tasks using another user identity. From the console...

    Applications > Application Types > Business-level applications > application_name > deployed_asset_composition_unit_name > Map RunAs roles to users. This page is the same as the Map RunAs roles to users page in the Create new business-level application wizard.

To view this page, the components in your composition unit must contain predefined RunAs roles and support SCA security. RunAs roles are used by components that need to run as a particular role for recognition while interacting with another component.


Username

User name for the RunAs role user.

This user already maps to the role specified in the Mapping users and groups to roles page. We can map the user to its appropriate role by either mapping the user to that role directly or mapping a group that contains the user to that role. After you specify the user name and password for the user and select a RunAs role, click Apply.


Password

Password for the RunAs user.


Role

Specifies a security role for a user within this application.

The authorization policy is only enforced when security is enabled.


User

Lists the user that is mapped to the specified role within this application.


Assign users to RunAs roles
Assign users and groups to roles


Related


Map security roles to users or groups collection for SCA composites

+

Search Tips   |   Advanced Search