Skip to main content Skip to complementary content

Restricting the expanded permissions and restoring the original access scope

Restore view-only or assign-only access to specific connections and resources for users who should not have edit permissions.

This procedure applies to users who, before the permission migration, had the Author permission but not the Manage permission for a workspace, and who were granted the Connections and Resources – Edit user permission after migration.

In the old permission structure, these users can only view or assign the connections and resources in this workspace with their Author permission. After the migration, when they have both the Connections and Resources – Edit user permission and the Author workspace permission, they inadvertently gain the ability to edit connections and resources.

To restore their original access boundaries, use dedicated workspaces and permission assignments to ensure that only authorized users can edit connections and resources, while others retain view-only access, following migration to the new permission model.

Procedure

  1. Create a new workspace specifically for sharing connections and resources.
    This creation requires the Environment Administrator role.
  2. Move the relevant connections and resources into the new workspace.
    For further information about how to move an object between workspaces, see Moving tasks to another workspace.
  3. Ensure that the users whose original access scope you need to store have the Connections and Resources – Edit user permission.
    By default, the Assets Manager role includes this permission. For further information about how to grant a user a specific role, see Assigning roles.
  4. Grant the View workspace permission for this new workspace to the same users.
    For further information about granting workspace permissions, see Assigning permissions to users for a single workspace and Assigning permissions to users for multiple workspaces.

Results

The original access boundaries to connections and resources are now restored.

Combine the procedure in this section with those in Restoring the edit access to achieve granular access control to these objects.

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – please let us know!