The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book Contents Find Matches in This Book Log in to Save Content Available Languages Download OptionsCisco Tidal Enterprise Scheduler 6.2 User Guide
You can add, edit and delete TES users from the Users interface. TES validates login names against its own user database. Before a person can operate TES, they must have a TES user account. Once a user name is registered, the user must log into Windows with that user name. Other user information includes their assigned security policy, their contact information and the runtime users for whom the user can run jobs.
There are three distinct entries for adding users, “Interactive Users”, “Runtime Users” and “LDAP Groups”. TES 6.0 allows for the setup of a user that authenticates against Active Directory/LDAP. TES also supports
AD/LDAP only users.
At login, user credentials are validated against Active Directory/LDAP. Once authenticated, TES obtains the user’s AD/LDAP groups and other information such and phone number and email.
Once login has completed as described above, a record is established in TES to represent the Active Directory/LDAP only user if it is not already present and only if the user belongs to an Active Directory/LDAP group defined in TES. All user activity logging is then performed against this new user record allowing for correct auditing and reporting.
Active Directory/LDAP only users are allowed to create and own jobs and other objects if their security permissions permit.
During installation of the Windows master, you provide an existing user in the AD/LDAP User Account. TES creates the first TES user account for you with this information, and automatically assigns you Super User capability. Having the Super User option selected in a User Definition provides access to all TES functions, and supersedes all security policies because it encompasses all security permissions. From this point on, you can set up other users, and specify their user data.
Along with specifying other user data, you need to specify a security policy for each user. TES comes with default security policy templates to help specify the appropriate functions available for each user based on a default network scheduling model.
Note You cannot remove Super User capability from the initial TES user account until at least one more user has been defined and given Super User capability.
When a new user launches TES, TES checks to see if the user’s login name is listed in the TES database. If the user is not listed, it displays an error message, and prevents the user from entering TES.
If you are going to schedule jobs for other users, you can specify those users on the Runtime Users tab of the User Definition dialog. This is necessary to access commands and environments created by those users for whom you are scheduling.
LDAP users can be imported into TES for improving user audit trails. These imported users inherit security from multiple LDAP groups. Imported LDAP user information is stored into a user definition that includes email, telephone, etc. Imported LDAP users are allowed to be owners of scheduling constructs such as jobs if their security permits.
Workgroups help organize users according to job function, security level, geographical area or any other category that may be helpful. TES workgroups can correspond to Windows workgroups, but they certainly do not have to. When you create a workgroup, you must always remember to add yourself to the workgroup. Creating a workgroup does not automatically make you a member of the workgroup. The extent of control you can wield over a workgroup is also dependent upon your individual TES security policy. For more information about security policies, see “Security Policies Pane” section .
Note When you install TES, you are automatically placed in the Schedulers workgroup. Schedulers is TES’s default workgroup.
Impersonating a user is one of the higher-level security permissions. When you impersonate another user, you have access to their TES jobs, job actions, job events, system events, user variables, calendars and workgroups as if you had logged on as that user.
You can specify and update user contact information such as phone number and email address. TES or another user can use this contact information to inform you of the status of a job.
From the Navigator pane, choose Administration>Runtime Users/Interactive Users or LDAP Groups to display the Users/LDAP Groups interface.
To change how the list of users/groups is sorted, click the head of a column to use it as a sort key.
The Users interface contains the following buttons:
Enter text that you want to search for within the columns displayed into this field.
Note This field at the top right of the grids will only search text columns that are not grayed out and are string-based. See Searchable Columns.
Note The Users interface contains the following columns:Depending on the selected user, some columns may not display.
If you choose View>Preferences from the main menu bar while viewing the Users/LDAP Groups interface, the Users Preferences dialog displays.
From the Users/Group Preferences dialog, you can select which columns are displayed in the Users/LDAP Groups interface and in what order the columns appear.
With a user/group selected, right-click in the Interactive/Runtime Users or LDAP Groups pane to display the context menu.
Depending on the user/group selected, the context menus contains the following elements:
With User/Group selected, when you right-click in the Interactive/Runtime Users or LDAP Groups pane, the context menu displays.
Depending on your selection, the context menus contain the following elements:
The Users interface for Interactive Users displays by choosing Administration>Interactive Users . To view the User Definition dialog, click the Add or Edit buttons from the Interactive Users interface or right-click in the Navigator pane and choose Add Interactive Users or Edit Interactive Users from the context menu. You can also double-click an Interactive user to display that user’s definition .
You can use an active directory name in this field if you want but you must leave the Domain field blank for this to work. (An active directory name would be in this format, username@domainname, such as jjohn@Tidalsoft.)
Typically the runtime users option is used by users with the responsibility of running jobs for others such as Schedulers or Operators. When you select runtime users for a user definition, the user gains the rights and access to all of the runtime users’ commands and environments, but only when scheduling and running jobs. This tab lists the defined users and user groups. The user being defined can only be a runtime user for a user if that user name is selected. User groups work the same way. You can either display the defined users or the defined user groups but not both at the same time.
This tab contains the following elements:
This tab contains the following elements:
Note If the All Agents option is not selected, and no individual agents are selected, the user will be unable to run any jobs.
This dialog contains the following elements:
This tab contains the following elements:
This tab contains the following elements:
A free text field for any comments regarding the user, up to 255 characters long.
The Users interface for Runtime Users displays by selecting Administration>Runtime Users . To view the User Definition dialog, click the Add or Edit buttons from the Users interface or right-click in the Navigator pane and select Add Runtime Users or Edit Runtime Users from the context menu. You can also double-click a Runtime user to display that user’s definition .
The LDAP Group interface displays by selecting Administration>LDAP Groups . To view the LDAP Group Definition dialog, click the Add or Edit buttons from the LDAP Group interface or right-click in the Navigator pane and select Add Group . You can also select Edit Group from the context menu of the LDAP Groups pane or double-click an LDAP group to display that group’s definition .
Note Features associated with LDAP Groups are common to other Users. See “Adding Interactive Users” section.
To add a Runtime user:
Step 1 From the Navigator pane, select Administration>Runtime Users to display the Runtime Users pane.
Step 2 Click the Add button or right-click in the Navigator pane and select Add Runtime Users from the context menu to display the User Definition dialog.
Step 3 If this is a new user definition, enter the new user name in the User Name field.
Step 4 For documentation, enter the Full Name or description associated with this user.
Step 5 In the Domain field, select a Windows domain associated with the user account required for authentication, if necessary.
Step 6 In the Windows/FTP Password field, enter the password for the user account provided by the Administrator.
Step 7 In the Confirm Password field, retype the password.
Step 8 If the passwords entered in the Windows/FTP Password and Confirm Password fields do not match, you must re-enter the password in both fields.
Step 9 Click OK to add or save the user record in the TES database.
To add an Interactive user:
Step 1 From the Navigator pane, select Administration>Interactive Users to display the Interactive Users pane listing all TES users.
If the TES users do not appear, you do not have the appropriate rights to view users.
Step 2 Double-click the name of an user account that you want to be able to run jobs to display the User Definition dialog.
Step 3 Click the Runtime Users tab in the User Definition dialog and select the check box(es) beside the name(s) of the Interactive user(s) you want to include in this TES users authorized user list.
Step 4 If you wish to restrict this user’s access to specific servers, click the Agents tab and make the appropriate selections.
Step 5 Click OK .
Note You cannot delete a user that presently owns a job, job event, system event, action, user defined variable or calendar. Open each item’s dialog and reassign the ownership of the items before deleting the user
To delete a user:
Step 1 From the Navigator pane, select Administration>Interactive Users or Runtime Users to display the Users interface.
Step 2 Select the user to delete and click the Delete button on the TES toolbar or right-click the user record and select Delete User from the context menu.
Step 3 When a dialog asks you to confirm your choice, click OK .
To edit a user definition:
Step 1 From the Navigator pane, select Administration>Interactive Users or Runtime Users to display the Users interface.
Step 2 Double-click the user record to edit or select the user name and click the Edit button or right-click the user record and select Edit User from the context menu to display the User Definition dialog.
Step 3 Edit the User Name if it does not match the Windows login name. Remember that the user name is case-sensitive.
Step 4 Edit the Full Name if necessary.
Step 5 To change the Security Policy for an Interactive user, select a new one from the drop-down menu on the Security tab. If you have the Superuser option set, the list is disabled. Click the Superuser option if you want the user to have access to all TES functions. To add or remove specific functions to a security policy, see “Security Policy Procedures” section.
Step 6 To add or remove runtime users for an Interactive user, click the Runtime Users tab.
Select the runtime users to add to the user’s definition from the Available Users list.
The user will have access to the commands and environments of the runtime users you assign.
Step 7 If you wish to change an Interactive user user’s access to specific servers, click the Agents tab and make the appropriate selections.
Step 8 Click the Notification tab to edit contact information for the Interactive user.
Step 9 Edit the password information, if necessary.
Note You cannot edit Workgroups information from the User Definition dialog. For more information on TES workgroups, see “Workgroups Pane” section.
Step 10 Click the Description tab to edit the user’s description (up to 255 characters).
Step 11 Click OK .
Step 12 Jobs in the production schedule that have not run yet will reflect the changes to the user data. Jobs that are running or that have completed retain the old user information.
To impersonate a user:
Step 1 From the Navigator pane, select Administration>Interactive Users to display the Interactive Users pane.
Step 2 Right-click the user you want to impersonate and select Impersonate User from the context menu.
Step 3 When a dialog asks you to confirm your choice, click OK .
To end user impersonation:
Step 1 From the Navigator pane, select Administration>Interactive Users to display the Interactive Users pane.
Step 2 Right-click the user and select End Impersonation from the context menu
Select Activities>End Impersonation from the main menu bar.
From the Navigator pane, select Administration>Interactive/Runtime Users or LDAP Groups to display the Users/Groups interface. If the users/groups do not display, you do not have the appropriate rights to view these items.
A workgroup is a set of users categorized under a communal name for the purpose of sharing items (jobs, actions, events etc.) which are owned by the workgroup. Each user in the workgroup has access to these items based on their own individual security policy.
If you have appropriate rights in your security policy you can create your own workgroups from the Workgroup pane. This pane displays all existing workgroups (within the bounds of your security policy). When you create a workgroup, you become its owner, and can add users to it; however, you must be a Super User . To belong to a workgroup created by another user, you have to be added by that user.
Note If you own a workgroup and do not include yourself in it, the workgroup’s associated items would not be accessible to you.
You can change the name and the members of any workgroup that you own. You cannot edit a workgroup that was created by another user unless you impersonate that user.
Workgroups help focus the information TES displays to each user. When you open the Jobs , Actions , Job Events , System Events , Calendars , or Variables panes, you will see only the items belonging to you and belonging to the workgroup(s) to which you belong.
For example, if you belong to a Payroll workgroup, you can see all the jobs, actions, etc., that are owned by the Payroll workgroup and were created by you or other members of the workgroup.
The following figure shows a generic workgroup structure using five users and two workgroups. Note that, in this figure, User 3 belongs to both workgroups, and therefore has access to all items (calendars, jobs, etc.) shown.
From the Navigator pane, select Administration>Workgroups to display the Workgroups pane.
Note You can change the name and the members of any workgroup that you own. You cannot edit a workgroup that was created by another user unless you impersonate that user.
Enter text that you want to search for within the columns displayed into this field.
Note This field at the top right of the grids will only search text columns that are not grayed out and are string-based. See Searchable Columns.
If you select View>Preferences from the main menu bar while viewing the Workgroups pane, the Workgroups Preferences dialog displays.
From the Workgroups Preferences dialog, you can select which columns are displayed in the Workgroups pane and in what order the columns appear.
When you right-click in the Navigator pane while viewing the Workgroups pane, the Navigator context menu displays.
The following describes the items in the Workgroups Navigator context menu:
When you right-click in the Workgroups pane, the Workgroups context menu displays.
The following describes the items in the Workgroups context menu.
The Workgroup Definition dialog displays when adding or editing a workgroup from the Workgroups pane .
Displays a list of all defined TES users and allows you to assign security policies for each user within the workgroup, in addition to the user’s existing security policy.
Note Editing a user’s security policy while defining a workgroup does not remove permissions that the user already has. You can only assign additional security policies as part of the specific workgroup.
Displays a list of all defined TES groups. A checkmark indicates groups that are assigned to the current workgroup.
The Agent tab displays all the TES agents that the owner of the workgroup is authorized to use. The agents which the workgroup can use to run jobs are indicated by a checkmark to the left of the listed name.
This tab displays the following element:
Note If the All Agents for option is not selected and no individual agents are selected, the workgroup cannot run any jobs.
The Description tab contains a free text field where you can enter comments about the workgroup (up to 255 characters).
To add a workgroup:
Step 1 From the Navigator pane, select Administration>Workgroups from the main menu bar TES to display the Workgroups pane.
Step 2 Click the Add button on the TES toolbar or right-click and select Add Workgroup from the context menu to display the Workgroup Definition dialog.
Step 3 Type a unique name for the workgroup in the Workgroup Name field (up to 30 characters).
Step 4 Click the Members tab.
Step 5 Select the users to add to the workgroup from the Available Users list.
– To include users in the workgroup, select the check box next to the user.
– To exclude users from the workgroup, clear the check box next to the user.
Note Always include yourself in the workgroups you define; otherwise, you cannot access its definition or owned items.
Step 6 Click the Agents tab.
Step 7 Select the agents to add to the workgroup.
Step 8 To enter a description for this workgroup, click the Description tab and type in the description. You can enter up to 255 characters.
You can delete a workgroup from the Workgroups pane. Workgroups can be deleted only when they no longer own jobs, actions, job events, system events, calendars and/or variables. (Go to each item owned by the workgroup and change the ownership.)
To delete a workgroup:
Step 1 From the Navigator pane, select Administration>Workgroups from the main menu bar TES to display the Workgroups pane.
Step 2 Select the workgroup to delete and click the Delete button o n the TES toolbar or right-click the workgroup and select Delete Workgroup from the context menu.
Step 3 Click Yes in the Confirm dialog.
You can change the name and the members of any workgroup that you own. You cannot edit a workgroup that was created by another user unless you impersonate that user.
When you change the members of a workgroup, updates for affected users will occur the next time they reopen the Jobs , Actions , Job Events , System Events , Calendars and/or Variables panes.
To edit a workgroup:
Step 1 From the Navigator pane, select Administration>Workgroups from the main menu bar TES to display the Workgroups pane.
Step 2 Select the workgroup you would like to edit and click the Edit button on the TES toolbar or double-click the workgroup you would like to edit or right-click the workgroup you would like to edit and select Edit Workgroup from the context menu.
Step 3 The Workgroup Definition dialog displays.
Step 4 To change the name of the workgroup, edit the Workgroup Name field.
Step 5 To include users in the workgroup, select the check box next to the name of the user you want to include.
To exclude users from the workgroup, clear the check box next to the name of the user you want to exclude.
Note Always include yourself in the workgroups you define; otherwise, you will not have access to its definition or owned items.
Step 6 To edit the agents of the workgroup, click the Agents tab.
Step 7 To edit the description of the workgroup, click the Description tab.
Step 8 Edit the description text for the workgroup. You can use up to 255 characters.
In the Workgroups pane, you can view all the workgroups that you own. When in the Jobs , Actions , Job Events , System Events , Variables and Calendars panes, all the workgroups that you own and belong to can be seen. Workgroup association can also be seen in the User Definition dialog.
From the Navigator pane, select Administration>Workgroups from the main menu bar TES to display the Workgroups pane.
To view members:
Step 1 From the Navigator pane, select Administration>Workgroups from the main menu bar TES to display the Workgroups pane.
Step 2 Double-click the workgroup you would like to examine to display its definition.
To view a workgroup to which you belong:
Step 1 From the Navigator pane, select Administration>Workgroups from the main menu bar TES to display the Workgroups pane. If the TES users do not appear, you do not have the appropriate rights to view users.
Step 2 Double-click the user name to display its User Definition dialog with the user information.
Step 3 Click the Workgroups tab. All the workgroups that the user belongs to are listed.
Security policies restrict access to certain TES functions. The defined access rights can be saved as a security policy, and then assigned to one user or multiple users.
For example, there might be different sets of users who:
You may have a set of users that creates jobs, a set of users that schedule jobs and another set that works with the job schedule. Using security policies, the users creating jobs can be restricted from inserting them into production and changing the schedule. The other users can be restricted from creating jobs.
TES includes default security policy templates that can be modified to create your own security policies. Each user within the supplied working model has a defined set of TES functions. When all the default security policies are in use, all aspects of scheduling are covered and available.
The following table lists the system features available for each of the default security templates:
Table 3-1 TES Security Policies
Default Security Policy Available System FeaturesThe default for new installations. This includes all available functions.
Creates, edits, and submits jobs. Creates workgroups and user-defined variables.
Edits and tests job schedules.
Runs and controls jobs. Responds to alerts that jobs may issue.
Views jobs and resources. Cannot perform modification.
Eac h security policy has its ow n name, description, and set of TES functions that it comprises it. Functions are chosen from a list of available functions and listed in the Security Policy Definition dialog. Once defined, security policies can be assigned to users from the User Definition dialog.
You can override security policy restrictions for a user by selecting the Super User option in the User Definition dialog. Users with Super User authority have access to all TES functions.
Note If you are the only defined TES user, you will not be allowed to remove the Super User option from your profile until you have defined at least one other TES user with Super User capability. This is a safety feature to prevent inadvertent exclusion from TES , which would require you to reinstall the product.
TES includes a set of default security policy templates. Inherent in these templates is the default network scheduling model where each user has a defined set of scheduling tasks. When all the security policies are assigned to users, the result is a complete enterprise network scheduling solution. Each user makes their contribution to the entire scheduling process. Each user can be insulated from tasks that are not relevant to their scheduling role.
You can modify these templates to create your own scheduling model based on the needs of your organization. Use caution so that vital functions are not inadvertently left out of a particular profile.
Note Selecting the Super User option in a User Definition supersedes any security policy previously assigned. The Superuser option provides full and unrestricted access to all TES functions. Some functions, such as calendars supersede even SuperUser privileges and are controlled by the function’s owner and available only to members of a workgroup. A SuperUser may access a function but can not modify the function if not a member of the workgroup.
The following table summarizes the functions that are available for each user account using the security policies provided with TES . If the function has been included in the security policy assigned to your user account then you have the capability described in that function.
Table 3-2 Functions available with the default security policies
Default Security Policy Available FunctionsAll TES functions are available.
Functions for configuring TES including configuring users, security, queues, agent lists, connections, and licenses.
All functions except adding users.
Functions for end-user support such as schedule control and queue and agent list configuration. Ability to edit job information as necessary.
Functions for end-user activity excluding configuration and schedule control, but including the tools necessary for creating, editing and submitting jobs.
Functions for viewing jobs and other items, but not for creating, editing, or deleting.
Each security policy includes the TES functions that a user with that policy can perform. You can create new security policies from the Security Policy Definition dialog, or add and remove TES functions to an existing security policy. When you finish defining a security policy, you assign it to a user through the User Definition dialog .
Note To use a job as a job dependency, you must have the ability (security policy permission) to View the job. However, View permission alone does not enable you to perform job control functions on the job.
The following are descriptions of each TES function, grouped by category, that can be added to or removed from a security policy:
Table 3-3 Agent Lists Functions
DescriptionSpecify a group of agents for the purpose of agent fault tolerance (dynamic rerouting), workload balancing and job broadcasting. The list will be available to all users that schedule jobs.
Edit Agent List
Edit the properties of an agent list.
Delete Agent List
Delete any agent list that exists in theScheduler database.
View Agent List
View the properties of any agent list.