Providing differential access for List Entries

You can have different set of accesses for list entries of different lists. Use the Access Control tab on the Security page to grant this level of access. The accesses are:
  • Modify access for uploading ListEntry
  • View access for exporting ListEntry
  • Modify access on a particular ListType, such as UDA.ListType.Sanctions to Disable/Enable List Metadata
  • Modify access of ListEntry to Disable/Enable ListEntry
  1. On the Management Console main menu, click System > Security.
    The Security page is displayed.
  2. Click the Access Control tab.
  3. Click the Add Access Control icon.
    The Add Access Control page is displayed.
  4. From the drop-down menu, select the Role to which you want to grant this granular access.
  5. Click the Add entity override icon.
    The Add Entity pop-up is displayed.
  6. From the drop-down, select FCC.ListEntry secured entity.
  7. In the left list box, select the list entries for which you want granular access and use the arrow to move those to the Selected Entities box.
  8. Click the Add button.
    The selected list entries are displayed on the Add Access Control page under the FCC.ListEntry secured entity.
  9. Assign the required Create, View, Modify, Delete, and Execute accesses to this role for the list entries.
    The users mapped to this role for the selected list entries will be able to perform differential tasks based on the accesses you just assigned. See the example below.
Example: In this scenario, no access has been granted to the secured entity type FCC.UDA.ListType.SANCTIONS in the Role page. In the Access Control page, you selected List1 and List2 secured entities in the FCC.UDA.ListType.SANCTIONS parent secured entity type. You assigned these accesses to Role 1 and Role 2. (User 1 is mapped to Role1 and User 2 is mapped to Role 2).
Table 1. Role 1
Create View Modify Delete Execute
List1 Yes
List2 Yes
Table 2. Role 2
Create View Modify Delete Execute
List1 Yes
List2 Yes

These are the user actions and system responses based on the provided accesses for the list entries:

Action: User 1 tries to modify List1; System Response: Failure

Action: User 1 tries to view List1; System Response: Success

Action: User 1 tries to Modify List2; System Response: Success

Action: User 2 tries to modify List1; System Response: Success