This tab is similar to the Activity rule form tab. Use the Security tab to specify the activity type and optionally to restrict which users (or other requestors) can execute the rule. This optional security supplants restrictions based on RuleSet and version.
You can specify zero, one, or more than one privilege to restrict access. Order is not significant. At run time, any match between a privilege listed and those a user possesses allows users to execute this rule.
Field |
Description |
||||||||||||||||||||
Start Settings | |||||||||||||||||||||
May Start? |
Select to allow users to start this activity directly through user input processing, for example through a Submit button or a For example, select the box for a service activity, or if this activity is called by an AJAX event from a form. At run time, if the check box is not selected and a user attempts to start this activity by user input, the activity does not run and returns a method status of For most activities, leave this check box cleared to promote security of your application. Unless needed by your design, allowing activities to be started from a URL or other user input—whether the requestor is authenticated or a guest—might let users bypass important checking, security, or setup. |
||||||||||||||||||||
Authenticate? |
Select to require that only authenticated requestors can start this activity. Clear to allow guest users to run this activity, if they meet other security and access criteria. Guest users — unauthenticated requestors — typically have access to rules in the RuleSets provided in the PRPC:Unauthenticated access group, as referenced in the Requestor type instance named pega.BROWSER. If you update the BROWSER requestor type to reference a different access group, or update the PegaRULES:Unauthenticated access group to make additional RuleSets available to unauthenticated users, review carefully this check box for each activity in the rulesets. Select this check box for all activities, except activities that guests run. In most cases, clear this check box if the activity is for an agent. Agents are not true authenticated users and by default cannot run activities that are restricted to authenticated users. However, this check box is ignored by agents for which the Bypass activity authentication check box (on the Security tab is checked; they can run activities regardless of the Authenticate? value. |
||||||||||||||||||||
Category | |||||||||||||||||||||
Activity Type |
Determine whether and how this activity can be referenced in other rules. For an activity that is not to be referenced in a flow rule, choose one of these four values:
Select
Do not choose |
||||||||||||||||||||
Identify privileges in this array to restrict which users and other requestors can execute this activity. At run time, if the user does not possess an access role that — through an Access of Role to Object rule — provides access to one of the identified privileges, the execution of the activity fails. |
|||||||||||||||||||||
Privilege Class |
Optional. Identify the Applies To key part of a class to use at run time to locate a privilege rule. Normally this is the same as the Applies To key part of this activity. |
||||||||||||||||||||
Privilege Name |
Optional. Identify the name for a privilege in that class (or an ancestor class). The class you enter and the name must together identify a privilege (using rule resolution including class inheritance.) |