setRolePermissions CLI command

Use the setRolePermissions command to allow or restrict access to individual GUI pages for a specified role. Use the output from the viewRolePermissions command as input for this command.

Syntax

setRolePermissions <filename.txt> -role <role_name> -ssl

Parameters

<filename.txt>

(Required.) A text file containing the output from the viewRolePermissions command, edited as necessary to indicate the new access levels for each GUI page. You can delete lines that aren't changing.

The following access levels are supported:
  • Read only = The user can view but cannot edit the page.
  • Modify = The user can edit the page.
  • No Access = The user cannot view the page.
-role <role_name>
(Required.) The name of the role.
-ssl
Required if SSL (HTTPS) is enabled.

Example command

setRolePermissions administrator_permissions.txt -role administrator

Example input file


                          Action,      Access Level
                       Cartridges,      No Access
    Cartridges by Logical Library,      No Access
             Cleanning Cartridges,      No Access
                           Drives,      No Access
        Drives by Logical Library,      No Access
              Email Notifications,      Read Only
                 Email Recipients,      Read Only
              Encryption Internal,      Read Only
               Encryption Manager,      Read Only
                   Ethernet Ports,      No Access
                           Events,      No Access
              Library Information,      No Access
               Licensed Functions,      No Access
                Logical Libraries,      Read Only
          Management GUI Behavior,      No Access
                   Master Console,      No Access
                   Password Rules,      Read Only
            Remote Authentication,      Read Only
                            Roles,      No Access
                    SNMP Requests,      Read Only
                       SNMP Traps,      Read Only
                       Scan Speed,      Modify
              Secure Socket Layer,      Read Only
                     Service Port,      Modify
            Syslogs Notifications,      Read Only
                           System,      Modify
             System Date and Time,      Modify
                            Tasks,      Modify
                            Users,      No Access
                    VOLSER Ranges,      Read Only
 VOLSER Ranges by Logical Library,      Read Only

Example output

The permissions were updated successfully