Requirement Policy

This table defines the Requirement policy.

Requirement

Revision

A,B,C...

Types

Customer Requirement, Requirement, User Requirement

Hidden

FALSE

 

States

Propose

Approve

Validate

Review

Release

Obsolete

Revisionable

FALSE

FALSE

FALSE

FALSE

TRUE

FALSE

Versionable

FALSE

FALSE

FALSE

FALSE

TRUE

TRUE

Auto Promote

FALSE

FALSE

FALSE

FALSE

FALSE

FALSE

Checkout History

TRUE

TRUE

TRUE

TRUE

TRUE

TRUE

Owner

read,modify,delete,create,promote, enable,disable, override, changename, changetype, changeowner, changepolicy, revoke,changevault,fromconnect, toconnect, fromdisconnect, todisconnect

read,modify, changeowner, promote,demote, override,enable disable,create, changevault,changename,changepolicy,changetype, fromconnect, toconnect, fromdisconnect, todisconnect,grant, revoke,show

read,modify, changeowner, promote,demote,, override,enable, disable,create, changevault, changename, changepolicy, changetype, fromconnect, toconnect, fromdisconnect, todisconnect,grant, revoke,show

read,modify,create,demote,grant, enable,disable, changename, changepolicy, changeowner, changetype,revoke,changevault, fromconnect, toconnect, fromdisconnect, todisconnect,show

demote,revise, show, read, toconnect, todisconnect. promote

read,delete, checkout, changeowner, execute,viewform, show

Public

none

none

none

none

none

none

Shadow Agent

all

all

all

all

none

all

System Conversion Manager

all

all

all

all

none

all

System Transition Manager

all

all

all

all

none

all

Employee

read, toconnect, todisconnect, viewform, show

filter context.user ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.revision

read, toconnect, todisconnect, viewform, show

filter context.user ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.revision

read, toconnect, todisconnect, viewform, show

filter context.user ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.revision

read, toconnect, todisconnect, viewform, show

filter context.user ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.revision

read, toconnect, todisconnect, viewform, show

filter context.user ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.name || context.user.assignment ~~ to[Assigned Requirement].businessobject.revision

read, viewform show

Global User

read,show

none

none

none

none

none

Requirement Manager

modify,delete, changeowner, promote,schedule, override,create, changevault, changename, changepolicy, changetype, fromconnect, toconnect, fromdisconnect, todisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_RequirementManager] == true

promote,demote, toconnect, todisconnect, viewform

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_RequirementManager] == true

promote,demote, fromconnect, toconnect, fromdisconnect, todisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_RequirementManager] == true

changeowner, demote, changename, fromconnect, toconnect, fromdisconnect, todisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_RequirementManager] == true

read,revise, toconnect, todisconnect,show

filter: "to\[Design Responsibility\] !='True' || program\[emxOrganization -method hasRDOrole -construct \${OBJECTID} role_RequirementManager\] == '1'"

read,delete,show, demote

Product Manager

modify, changeowner, promote,create, changevault, changename, changepolicy, changetype, fromconnect, toconnect, fromdisconnect, todisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_ProductManager] == true

modify, changeowner, promote,demote, changevault, changename, changepolicy, changetype, fromconnect, toconnect, fromdisconnect, todisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_ProductManager] == true

changeowner, promote,demote, changename, changepolicy, changetype, fromconnect, toconnect, fromdisconnect, todisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_ProductManager] == true

changeowner, demote, changename, fromconnect, toconnect, fromdisconnect, todisconnect

ilter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_ProductManager] == true

read,demote,revise, toconnect, todisconnect,show

filter: "to\[Design Responsibility\] !='True' || program\[emxOrganization -method hasRDOrole -construct \${OBJECTID} role_ProductManager\] == '1'"

read,delete, fromdisconnect, todisconnect,show

System Engineer

changeowner, promote,create ,changevault, changename, changepolicy, changetype, fromconnect, fromdisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_SystemEngineer] == true

fromconnect, toconnect, fromdisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_SystemEngineer] == true

fromconnect, toconnect, fromdisconnect, todisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_SystemEngineer] == true

fromconnect, toconnect, fromdisconnect, todisconnect

filter to[Design Responsibility] !='True' || program[emxOrganization -method hasRDOrole -construct ${OBJECTID} role_SystemEngineer] == true

read,revise, fromconnect, fromdisconnect, show

none

Access Grantor

read,grant,revoke, show

read,grant,revoke, show

read,grant,revoke, show

read,grant,revoke, show

read,grant,revoke, show

read,grant,revoke, show

Public Add

read,toconnect ,todisconnect,show

filter context.user == to[EC Affected Item].from.owner || context.user == to[EC Affected Item].from.to[Assigned EC].from.name || context.user == to[EC Implemented Item].from.owner || context.user == to[EC Implemented Item].from.to[Assigned EC].from.name || context.user == to[Resolved To]. from.owner || context.user == to[Resolved To]. from.to[Assigned EC].from.name

read,toconnect, todisconnect,show

filter context.user == to[EC Affected Item].from.owner || context.user == to[EC Affected Item].from.to[Assigned EC].from.name || context.user == to[EC Implemented Item].from.owner || context.user == to[EC Implemented Item].from.to[Assigned EC].from.name || context.user == to[Resolved To]. from.owner || context.user == to[Resolved To]. from.to[Assigned EC].from.name

none

read,toconnect, todisconnect,show

filter context.user == to[EC Affected Item].from.owner || context.user == to[EC Affected Item].from.to[Assigned EC].from.name || context.user == to[EC Implemented Item].from.owner || context.user == to[EC Implemented Item].from.to[Assigned EC].from.name || context.user == to[Resolved To]. from.owner || context.user == to[Resolved To]. from.to[Assigned EC].from.name

read,toconnect, todisconnect,show

filter context.user == to[EC Affected Item].from.owner || context.user == to[EC Affected Item].from.to[Assigned EC].from.name || context.user == to[EC Implemented Item].from.owner || context.user == to[EC Implemented Item].from.to[Assigned EC].from.name || context.user == to[Resolved To]. from.owner || context.user == to[Resolved To]. from.to[Assigned EC].from.name

none

Public Read

none

none

read,show

filter context.user == to[EC Affected Item].from.owner || context.user == to[EC Affected Item].from.to[Assigned EC].from.name || context.user == to[EC Implemented Item].from.owner || context.user == to[EC Implemented Item].from.to[Assigned EC].from.name

none

read,show

filter context.user == to[EC Affected Item].from.owner || context.user == to[EC Affected Item].from.to[Assigned EC].from.name || context.user == to[EC Implemented Item].from.owner || context.user == to[EC Implemented Item].from.to[Assigned EC].from.name

read,show

filter context.user == to[EC Affected Item].from.owner || context.user == to[EC Affected Item].from.to[Assigned EC].from.name || context.user == to[EC Implemented Item].from.owner || context.user == to[EC Implemented Item].from.to[Assigned EC].from.name

The original name of this policy was Software User Requirement and its symbolic name reflects the original name. See Renamed Administrative Objects.