About Permissions Manager
To make a permission request for RDS6 please click here - this will only work while on the CCHMC network or VPN.
To make a permission request for BMIISI on CCHMC Res domain shares (aka RES DP) please click here - This link will work on the internal and external network.
To request a folder to be added to Permissions Manager, send the following information to email@example.com :
- Path of folder to be locked
- Names of at least 2 authorizers who will manage access to the protected folder
The Permissions Manager tool lets users request permission to select drives on the Research Data Storage (RDS) System (learn more about which drives can be managed). Instead of users emailing various folder administrators and having the email possibly get lost or deleted, the Permissions Manager takes care of everything. All a user has to do is go through a few simple steps and every piece of information needed to process a request gets captured and routed for approval.
NOTE TO MAC USERS: Please use Firefox to access the permissions manager, as Safari has been known to have problems with this application.
Here is the home screen of the Permissions Manager:
- Summary - Brings you back to the home screen of the permissions manager and displays all recent pending, approved, declined or cancelled requests.
- Pending Requests - Allows for a more detailed search of all pending requests made either for the user or by the user.
- Permission Requests - Allows the user to request or revoke permission to a folder or network drive.
- Membership Requests - Ignore this tab (for advanced users).
- Management (Authorizers Only) - Shows all folders that the user is in charge of and who has access to those folders.
- Search - Allows for a search of any type of request, operation made on a permissions request, user, start or end date, or request ID.
Reports - Allows an administrator to generate reports such as request statistics, permissions granted, and management status.
NOTE: Only administrators can generate synchronization reports. All users can generate other reports.
About drives and managed folders top
There are two types of RDS drives, each of which can contain folders and sub folders.
All users can share data by uploading it to their (G:) drive, or divisional shared drive. By default, data added to a divisional shared drive can be viewed and modified by anyone in your division. However, you can request that a folder be locked down so that data inside is shared only with select users.
If you need to share a large volume of data over a lengthy period of time -- for example, files related to a research lab or study -- it is better to store this data on a project drive. This is an area separate from your divisional shared (G:) drive, and can be shared among multiple users via the Permissions Manager tool.
Requesting new drives/protected folders
You automatically should have access to your divisional shared (G:) drive. If these drives don't appear automatically when you log in to the Cincinnati Children's network, you can look up the drive paths and then map them manually (learn how on Windows and Mac OS X). If the drives still don't appear, send an email to firstname.lastname@example.org).
To request a new project drive, you will need to go to BeMyIT Store and submit a request there.
Also, if you add a new folder to your divisional shared or project drive, this folder does NOT automatically appear in the Permissions Manager. To share this folder, you need to send an email to email@example.com with names of two people who will manage access to this folder, and request that it be added to the Permissions Manager.
Renaming folders and drives
A protected folder \ drive will list in Permissions Manager. If it is necessary to rename it, you must email firstname.lastname@example.org before renaming or else the permissions might not transfer properly.
Copying data from protected folders and drives
A protected folder \ drive has its own set of permissions. When moving data from a protected folder \ drive, you must copy & paste instead of drag & drop. Dragging and dropping will likely result in the permissions not transferring properly, resulting in access denied errors. After pasting data in the new folder, the copied data can be deleted from the original folder.
Submitting permission requests top
There are two different types of user roles in Permissions Manager.
Requestor: Can request access to any folder.
Authorizer: Can grant or revoke requests to gain access to a locked folder for which he/she is the approver.
If you would like to request access for yourself or for another user to any folder maintained by the Permissions Manager, you first need to click on the Permission Requests tab on the left side of the screen.
Once the page loads, you will be taken to the request screen.
Step 1: Select a User
By default, you will be the user that is requesting permissions to access a folder. If you are trying to gain access for yourself then continue to Step 2.
If requesting permissions for a user other than yourself, click the Change User button.
The Users Search window will appear and you can search for the user for whom you wish to request permissions.
In the empty textbox, enter the user’s last name, first name and click on Search. If you are not sure of the spelling of the names, then type the last letter of the last name, followed by a coma, and the first letter of the first name. Click on Search.
If a list of multiple users is displayed, then check the corresponding Department, Logon Name, and Title listed for the users. Click on the Display Name of the desired user, and continue to Step 3.
There are additional ways to search for a user. These search options are listed below:
Click in the box labeled Name, and select Logon Name
If you know the Logon Name (Network ID at Cincinnati Children’s) of the user, then select Logon Name from this list, enter the network ID in the blank textbox, and click on Search.
Click in the box labeled Contains and select any one of the following options:
- Begins With - If you know the first few letters of the user's last name, then you can type those in the empty textbox. For example, if you are trying to find the user Spivak, Alexandar but have no idea how to spell the name, you would select Name, Begins With, type SP in the empty textbox, and click on Search.
- Ends With – If you know the last few letters of the user’s first name, then you can type those in the empty textbox. For example, if you are trying to find the user, Alexandar Spivak but have no idea how to spell the last name. You would select Name, Ends With, type DER in the empty textbox, and click on Search.
- Contains - If you know some letters of a name, but are unsure whether it is the first name or last name, then type that in the empty textbox. For example, in the name Alexander Spivak, you are only sure of “ander”, then you can select Name, Contains, type ANDER in the empty textbox, and click on Search.
- That is - If you know the exact spelling of the user's name or Logon Name (network ID), only then use this option. For example, if you know Alex's user ID is SPI9IW, then you would select Logon Name, That is, type SPI9IW in the empty textbox, and click on Search.
Once the user is found, click on their name in the Display Name column and that is the user for whom you will be requesting permissions.
Step 2: Folders
Here is where you select the folder to which you wish to give the user access. Click on Browse.
The Select Folders window will appear.
If you know the exact name of the path of the folder you can type it in the search field at the top of the window.
Otherwise, look through the listed available drives until you find the drive you desire. Once it is found, click on the + next to the name.
This will expand the drive and show all the sub folders of that drive.
If you know a sub folder exists but it is not listed, it probably has not been added to Permissions Manager as a managed folder. Learn more about how to request that folder to be added.
If you want to collapse the drive you can click the - next to the name and it will go back to the way it was.
Sort through the folders until the desired folder is found.
Click the checkbox next to the name of the folder and click OK at the bottom of the window.
You can also select multiple folders by clicking multiple checkboxes.
The path for the selected folder(s) will be added to the textbox.
Click Add and the folders will be moved to the operations step.
Step 3: Operations
This field shows each folder you are trying to give permissions to. The available operations are shown and in this case it is Grant Access since we are trying to gain access to the Project B folder. The type of permission is also listed which is Read Write, which allows the user to open, as well as edit, any file in that folder.
There is an option to give users read only permissions. However, the folder needs to be set up with both read only and read write permissions. You can specify the setup type when submitting a request to lockdown a folder thru [link to contact us form] or to email@example.com, a new drive request at https://research.cchmc.org/bmistore/
If a user already has permission to a folder and you would like to revoke their permission, follow the same steps up to this point. Under Available Operations it will say Revoke Access.
If you wish to remove a folder from this list, click the checkbox next to the name of the folder you would like to remove and then click Remove.
Step 4: Explanation
An explanation as to why you are requesting access to this folder is MANDATORY. Briefly describe the reason in the textbox.
Step 5: Expiration (Optional)
Below the Explanation step click Advanced to make a small field appear. If a user needs permissions for a finite length of time, you can enter the date or the number of days after which you want these permissions to be automatically revoked.
Click on Finish to submit the request.
Approving/denying permissions requests (authorizers only) top
Once a Permission request has been sent, the authorizer will receive an email stating that the permission request needs to be approved or declined.
Part 1: This contains the link to the Permissions Manager where the authorizer will grant or decline permission to a folder.
Part 2: This contains the information about the request such as the name of the user requesting permission, the folder they wish to have access to, permission level, and reason.
The rest of the email contains frequently asked questions which are sent with every permission request email and can be helpful.
Click the link at the top to proceed to the Permission Approval area of the Permissions Manager site.
The top of the screen is very important. It displays the Request Type. In many cases it will be Grant Access, but in some cases it may say Revoke Access.
If a user already has access to a folder and another request is made to revoke access for a user to that folder make sure you are approving the correct action. If you approve a Revoke request, that user will no longer have permission to that folder. If you decline a Revoke request, the means the user will still have their current permissions.
Explanation of Page Layout
- The user, along with all their information, wishing to gain access to a folder.
The folder the user will have access to and the type of permission.
NOTE: If multiple folders were selected, they will all display under the drop down box next to Membership to:
The length of time the permission will last. If the Expire On option was selected a different date can be picked. If the Expire After option was selected a different amount of days can be entered.
NOTE: Once the Approve button is clicked in step 7, a different date option can be selected before clicking OK.
- All authorizer(s) for the folder.
- The reason why the user needs permission for the folder.
- A MANDATORY explanation, by the authorizer, why permission is being approved or declined.
- Click Approve or Decline for the permission and click OK.
Once a permissions request is approved or declined for a user an email will be sent to that user.
Part 1: The request type (i.e. Grant or Revoke).
Part 2: Whether the request was approved or declined.
Part 3: A link that goes to the permissions site and displays, in more detail, information on the request.
The rest of the email contains additional instructions and information that is useful such as mapping a network drive to a computer and contact information.
Viewing permissions top
If you would like to see who has permissions to a particular folder you can click on the Management tab on the left side of the screen.
Then underneath Management click Directory Authorizer and you will be taken to the management screen.
Under the Managed Directories column click on the folder you would like to look into.
Under the Permissions column the folders you are managing will appear. Click the + next to the name of the folder you are interested in to see all the users with permissions to that folder as well as when their permissions expire.
The other folders that may appear under the initial Directory you picked are groups from the I.S. department. They manage the whole permissions program and are apart of many folders. Do not worry about them being listed under your directories.
Getting additional help top
If there are still any issues after reading these instructions and any help is still needed please email Research IT Support for further assistance.