Privileges Required to Use Credential Protocols

To use Credential Protocols, you need one of the following:

  • scheduler-administrator or redwood-administrator role
  • system or partition-level permissions
  • object-specific privileges

Using Credential Protocols

The following privilege ranks are available on Credential Protocols:

  • Create - allows you to create a Credential Protocol on the level the privilege was granted (system, partition), you have no further privileges through this rank, you automatically get All privilege rank on Credential Protocols you create.
  • View - allows you to view a Credential Protocol on the level the privilege was granted (system, partition), you have no further privileges through this rank.
  • Edit - allows you to create, view, and edit a Credential Protocol on the level the privilege was granted (system, partition).
  • Delete - allows you to create, view, and delete a Credential Protocol on the level the privilege was granted (system, partition).
  • All - full control over a Credential Protocol on the level the privilege was granted (system, partition).

You also require View privileges on the partition of the Credential Protocol, usually GLOBAL.

Credential Protocols can reference the following objects, you need at least View privileges on these objects and their partition(s) when you want to edit a Credential Protocols that references them:

Built-in Roles

  • The scheduler-administrator or redwood-administrator built-in role provides full control over Credential Protocols.
  • The scheduler-viewer built-in role provides read-only access to Credential Protocols.

Creating Credential Protocols

  • Create - allows you to create Credential Protocols on the level the privilege was granted (system, partition), you have no further privileges through this rank, you automatically get All privilege rank on Credential Protocols you create.
  • View - allows you to view Credential Protocols on the level the privilege was granted (system, partition, object), you have no further privileges through this rank.
  • Edit - allows you to create, view and edit all Credential Protocols on the level the privilege was granted (system, partition, object).
  • Delete - allows you to create, view, and delete all Credential Protocols on the level the privilege was granted (system, partition, object).
  • All - full control over all Credential Protocols on the level the privilege was granted (system, partition, object).

Note: You can create Credential Protocols, however, you will only be able to use them with specially crafted Definition Types.

Editing Credential Protocols

  • Edit - privilege rank on Credential Protocol, or on Credential Protocols partition or system-wide.
  • All - privilege rank on Credential Protocol, or on Credential Protocols partition or system-wide.

Deleting Credential Protocols

  • Delete privilege on the Credential Protocol, or on a Credential Protocol on the level the privilege was granted (system, partition, object).
  • All Credential Protocol, or on a Credential Protocol on the level the privilege was granted (system, partition, object).

Warning: Do not attempt to delete built-in Credential Protocols.

See Also