{"id":1943,"date":"2011-09-14T21:43:38","date_gmt":"2011-09-15T04:43:38","guid":{"rendered":"http:\/\/www.technosolutions.com\/kb\/1943\/creating-security-workflow-roles\/"},"modified":"2019-09-13T03:56:05","modified_gmt":"2019-09-13T10:56:05","slug":"creating-workflow-and-security-roles","status":"publish","type":"post","link":"http:\/\/www.technosolutions.com\/kb\/1943\/creating-workflow-and-security-roles\/","title":{"rendered":"Creating Workflow and Security Roles"},"content":{"rendered":"<p><!-- Start ScreenSteps Content --><\/p>\n<div class=\"LessonContent\">\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Overview<\/h3>\n<div class=\"StepInstructions\">\n<p><i>Roles<\/i> represent a job function or a group of users. In <i>TopTeam<\/i>, Roles are used for consolidating security privileges as well as for workflow. We recommend that you manage TopTeam repository security by creating <i>Roles<\/i> and then assign these Roles to <i>Project Team Members<\/i>.<\/p>\n<p>This article describes the steps for creating <i>Roles<\/i>.<\/p>\n<\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Who should read this?<\/h3>\n<div class=\"StepInstructions\">\n<ul>\n<li>TopTeam Administrators<\/li>\n<li>Project Administrators<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Prerequisites<\/h3>\n<div class=\"StepInstructions\">\n<ul>\n<li>You must have <i>System Administrator<\/i> privileges to perform this operation.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Step 1. Open the Administration screen<\/h3>\n<div class=\"StepImage\" style=\"margin: 10px 0px;\"><img loading=\"lazy\" decoding=\"async\" style=\"padding: 3px; border: 1px solid #ccc;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-layzr=\"http:\/\/www.technosolutions.com\/kb\/wp-content\/uploads\/2018\/03\/wpid31822-media_1438247723990-1-1.png\" alt=\"wpid31822-media_1438247723990-1-1.png\" width=\"411\" height=\"249\" \/><\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Step 2. Click Configure System Security<\/h3>\n<div class=\"StepImage\" style=\"margin: 10px 0px;\"><img loading=\"lazy\" decoding=\"async\" style=\"padding: 3px; border: 1px solid #ccc;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-layzr=\"http:\/\/www.technosolutions.com\/kb\/wp-content\/uploads\/2018\/03\/wpid31824-media_1298112682797-1-1.png\" alt=\"wpid31824-media_1298112682797-1-1.png\" width=\"723\" height=\"371\" \/><\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Step 3. Click Define Security Roles (Groups)<\/h3>\n<div class=\"StepImage\" style=\"margin: 10px 0px;\"><img loading=\"lazy\" decoding=\"async\" style=\"padding: 3px; border: 1px solid #ccc;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-layzr=\"http:\/\/www.technosolutions.com\/kb\/wp-content\/uploads\/2018\/03\/wpid31823-media_1298112864355-1-1.png\" alt=\"wpid31823-media_1298112864355-1-1.png\" width=\"567\" height=\"382\" \/><\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Step 4. The Define Workflow and Security Roles editor opens<\/h3>\n<div class=\"StepImage\" style=\"margin: 10px 0px;\"><img loading=\"lazy\" decoding=\"async\" style=\"padding: 3px; border: 1px solid #ccc;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-layzr=\"http:\/\/www.technosolutions.com\/kb\/wp-content\/uploads\/2018\/03\/wpid31825-media_1438247977661-1-1.png\" alt=\"wpid31825-media_1438247977661-1-1.png\" width=\"567\" height=\"547\" \/><\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Step 5. Click New<\/h3>\n<div class=\"StepImage\" style=\"margin: 10px 0px;\"><img loading=\"lazy\" decoding=\"async\" style=\"padding: 3px; border: 1px solid #ccc;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-layzr=\"http:\/\/www.technosolutions.com\/kb\/wp-content\/uploads\/2018\/03\/wpid31826-media_1298112888725-1-1.png\" alt=\"wpid31826-media_1298112888725-1-1.png\" width=\"533\" height=\"261\" \/><\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Step 6. Enter the Role&#8217;s information<\/h3>\n<div class=\"StepImage\" style=\"margin: 10px 0px;\"><img loading=\"lazy\" decoding=\"async\" style=\"padding: 3px; border: 1px solid #ccc;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-layzr=\"http:\/\/www.technosolutions.com\/kb\/wp-content\/uploads\/2018\/03\/wpid31827-media_1298112992873-1-1.png\" alt=\"wpid31827-media_1298112992873-1-1.png\" width=\"522\" height=\"481\" \/><\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">Step 7. New Role is created<\/h3>\n<div class=\"StepImage\" style=\"margin: 10px 0px;\"><img loading=\"lazy\" decoding=\"async\" style=\"padding: 3px; border: 1px solid #ccc;\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-layzr=\"http:\/\/www.technosolutions.com\/kb\/wp-content\/uploads\/2018\/03\/wpid31828-media_1309606556330-1-1.png\" alt=\"wpid31828-media_1309606556330-1-1.png\" width=\"533\" height=\"261\" \/><\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<h3 class=\"StepTitle\" style=\"font-size: 20px;\">See Also<\/h3>\n<div class=\"StepInstructions\">\n<ul>\n<li>To use this Role as a security role, you need to assign privileges to the role. Refer to the article <a href=\"http:\/\/www.technosolutions.com\/kb\/1953\/granting-privileges-to-roles\/\" target=\"_blank\" rel=\"noopener\">Granting Privileges to Roles.<\/a><\/li>\n<li>To assign Role to Project Team Members, refer to the article <a href=\"http:\/\/www.technosolutions.com\/kb\/1902\/assigning-roles-to-project-team-members\/\" target=\"_blank\" rel=\"noopener\">Assigning Roles to Project Team Members.<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"LessonStep top\">\n<div class=\"StepInstructions\">\n<p>Revised: March 15th, 2018<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!-- End ScreenSteps Content --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Roles represent a job function or a group of users. In TopTeam, Roles are used for consolidating security privileges as well as for workflow. We recommend that you manage TopTeam repository security by creating Roles and then assign these Roles to Project Team Members. This article describes the steps for creating Roles. Who should read this? TopTeam Administrators Project Administrators Prerequisites You must have System Administrator privileges to perform this operation. Step 1. Open the Administration screen Step 2. Click Configure System Security Step 3. Click Define Security Roles (Groups) Step 4. The Define Workflow and Security Roles editor <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[140,139,285,31],"class_list":["post-1943","post","type-post","status-publish","format-standard","hentry","category-security","tag-permissions","tag-roles","tag-security","tag-workflow"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/paoaNA-vl","_links":{"self":[{"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/posts\/1943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/comments?post=1943"}],"version-history":[{"count":21,"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/posts\/1943\/revisions"}],"predecessor-version":[{"id":48408,"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/posts\/1943\/revisions\/48408"}],"wp:attachment":[{"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/media?parent=1943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/categories?post=1943"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.technosolutions.com\/kb\/wp-json\/wp\/v2\/tags?post=1943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}