In addition to the global permissions configured for Groups, FlexDeploy supports a hierarchical permission model for folders, projects, and releases. This permission model allows fine-grained access control to meet any security requirements. Default permissions can be set on the root folder for the entire hierarchy.
...
The table below provides a summary of the permissions for each object folder and project type. For Release permissions, view Release Security.
Permission | Description |
---|---|
Read | Grants permission to open |
folders and projects for viewing. |
View Logs |
Project execution and associated logs can be viewed |
Create Folder/Project |
Folders and Projects can be created in this folder. | |
Create Release | Releases can be created in this folder. |
Configure Folder/Project |
Can configure folders and projects. |
Configure Files |
Project files can be discovered, updated, and evaluated. Only applies to package-based projects |
Inactivate Missing Files |
Inactivate missing files |
is available when discovering project files. Only applies to package-based projects |
Configure Commands |
Build and |
Deployment commands for package-based projects can be managed. This should generally be restricted to admin users. Only applies to package-based projects. | |
Execute | Grants permission to execute build/deploy/execute/test workflows. Deployment to specific environments are further controlled by Deployment Permissions. |
Tip |
---|
The FlexDeploy permission model offers great flexibility for managing security. However, you must understand that with fine grained security comes the overhead of needing to configure and maintain it. You should avoid managing permissions at a level lower than you really need. For example, if you choose to manage all security at the individual project level, you will need to configure the security every time you create a new project. Instead, if you establish permissions near the top of the folder hierarchy, you will only need to configure security when you create new high-level folders or when your security requirements change. |