The Permissions Manager tool lets users request permission to drives on the Research Data Storage (RDS) System. Instead of users emailing various folder administrators and having the email possibly get lost or deleted, Permissions Manager takes care of everything. All a user has to do is go through a few simple steps to submit a request and they will be properly routed for approval.
»To make a permission request for RDS6 please visit https://bmirdsdp/dp - this will only work while on the CCHMC network or when VPN connected to CCHMC.
»To make a permission request for BMIISI on CCHMC RES domain shares (aka RES DP) please visit https://dp.research.cchmc.org - this link will work on the CCHMC network and on external networks.
MAC USERS: Please use Firefox to access the permissions manager, as Safari has been known to have problems with this application.
Download a PDF copy of this document: RESITHUB-ManagingPermissions-020518-1355-3.pdf
Request a Folder be Added to Permissions Manager
To request a folder to be added to Permissions Manager, send the following information to firstname.lastname@example.org:
- Path of folder to be protected
- The names of at least 2 authorizers who will manage access to the protected folder
Permissions Manager Home Screen
- Summary - Brings you back to the home screen of the permissions manager and displays all recent pending, approved, declined or cancelled requests.
- Pending Requests - Allows for a more detailed search of all pending requests made either for the user or by the user.
- Permission Requests - Allows the user to request or revoke permission to a folder or network drive.
- Membership Requests - Ignore this tab (for advanced users).
- Management (Authorizers Only) - Shows all folders that the user is in charge of and who has access to those folders.
- Search - Allows for a search of any type of request, operation made on a permissions request, user, start or end date, or request ID.
- Reports - Allows an administrator to generate reports such as request statistics, permissions granted, and management status.
NOTE: Only administrators can generate synchronization reports. All users can generate other reports.
About Drives and Managed Folders
There are two types of RDS drives, each of which can contain folders and sub folders.
All users can share data by uploading it to their (G:) drive, or divisional shared drive. By default, data added to a divisional shared drive can be viewed and modified by anyone in your division. However, you can request that a folder be locked down so that data inside is shared only with select users.
If you need to share a large volume of data over a lengthy period of time -- for example, files related to a research lab or study -- it is better to store this data on a project drive. This is an area separate from your divisional shared (G:) drive, and can be shared among multiple users via the Permissions Manager tool.
Requesting A New Drive
You should automatically have access to your divisional shared (G:) drive. If the drive doesn't appear automatically when you log in to the Cincinnati Children's network, please send contact your Business/Admin Office.
To request a new project drive, you will need to go to BeMyIT Store, login with your CCHMC credentials, and submit a new request for an RDS drive.
Also, if you add a new folder to your divisional shared or project drive, this folder does NOT automatically appear in the Permissions Manager. To share this folder, you need to send an email to email@example.com asking that it be protected, with the full path of the folder to be protected, and the names of two people who will manage access to this folder.
A protected folder will list in Permissions Manager. If it is necessary to rename it, you must email firstname.lastname@example.org before renaming or else the permissions might not transfer properly.
Copying Data from Protected Folders and Drives
A protected folder has its own set of permissions. When moving data from a protected folder, you must copy & paste instead of drag & drop. Drag and drop will likely result in the permissions not transferring properly, resulting in access denied errors. After pasting data in the new folder, the copied data can be deleted from the original folder.
Submitting Permission Requests
There are two different types of user roles in Permissions Manager:
- Requestor: Can request access to any folder.
- Authorizer: Can grant or revoke requests to gain access to a locked folder for which he/she is the approver.
If you would like to request access for yourself or for another user to any folder maintained by the Permissions Manager, you first need to click on the Permission Requests tab on the left side of the screen:
Once the page loads, you will be taken to the request screen.
Step 1: Select a User
By default, you will be the user that is requesting permissions to access a folder. If you are trying to gain access for yourself then continue to Step 2.
- If requesting permissions for a user other than yourself, click the Change User button:
- The Users Search window will appear and you can search for the user for whom you wish to request permissions:
- In the empty textbox, enter the user’s name as "last name, first name" and click the Search button. If you are not sure of the spelling of the names, then type the last letter of the last name, followed by a coma, and the first letter of the first name.
- If a list of multiple users is displayed, then check the corresponding Department, Logon Name, and Title listed for the user. Click on the Display Name of the desired user, and continue to Step 2.
There are additional ways to search for a user. These search options are listed below:
If you know the Logon Name (Network ID at Cincinnati Children’s) of the user, then click in the box labeled Name, select Logon Name, enter the network ID in the blank textbox, and click the Search button. Once the user is found, click on their name in the Display Name column and that is the user for whom you will be requesting permissions.
Click in the box labeled Contains and select any one of the following options:
- Begins With - If you know the first few letters of the user's last name, then you can type those in the empty textbox. For example, if you are trying to find the user "Spivak, Alexandar" but have no idea how to spell the name, you would select Name, Begins With, type "SP" in the empty textbox, and click the Search button.
- Ends With – If you know the last few letters of the user’s first name, then you can type those in the empty textbox. For example, if you are trying to find the user, "Alexandar Spivak" but have no idea how to spell the last name. You would select Name, Ends With, type "DER" in the empty textbox, and click the Search button.
- Contains - If you know some letters of a name, but are unsure whether it is the first name or last name, then type that in the empty textbox. For example, in the name "Alexander Spivak", you are only sure of “ander”, then you can select Name, Contains, type "ANDER" in the empty textbox, and click the Search button.
- That is - If you know the exact spelling of the user's name or Logon Name (network ID), only then use this option. For example, if you know Alex's user ID is "SPI9IW", then you would select Logon Name, That is, type "SPI9IW" in the empty textbox, and click the Search button.
Once the user is found, click on their name in the Display Name column and that is the user for whom you will be requesting permissions.
Step 2: Folders
- Here is where you select the folder to which you wish to give the user access. Click the Browse button:
- The Select Folders window will appear:
- If you know the exact name of the path of the folder you can type it in the Search field at the top of the window:
Otherwise, look through the list of available drives until you find the drive you desire. Once it is found, click on the + next to the name. This will expand the drive and show all the sub folders of that drive. If you want to collapse the drive you can click the - next to the name and it will go back to the way it was:
If you know a sub folder exists but it is not listed, it probably has not been added to Permissions Manager as a managed folder. Learn more about how to request that folder to be added at the top of this page.
Sort through the folders until the desired folder is found. Select the checkbox next to the name of the folder and click the OK button at the bottom of the window. You can also select multiple folders by clicking multiple checkboxes:
The path for the selected folder(s) will be added to the textbox. Click the Add button and the folder(s) will be moved to the Operations Step:
Step 3: Operations
This field shows each folder you are trying to give permissions to. The available operations are shown and in this case it is Grant Access since we are trying to gain access to the Project B folder. The type of permission is also listed which is Read Write, which allows the user to open, as well as edit, any file in that folder:
If a user already has permission to a folder and you would like to revoke their permission, follow the same steps up to this point. Under Available Operations it will instead say Revoke Access:
If you wish to remove a folder from this list, click the checkbox next to the name of the folder you would like to remove and then click the Remove button:
Step 4: Explanation
An explanation as to why you are requesting access to this folder is MANDATORY. Briefly describe the reason in the textbox:
Step 5: Expiration (Optional)
Below the Explanation Step click Advanced to make a small field appear. If a user needs permissions for a finite length of time, you can enter the date or the number of days after which you want these permissions to be automatically revoked:
Click the Finish button to submit the request.
Approving/Denying Permissions Requests (Authorizers Only)
Permission Request Email
Once a Permission request has been sent, the authorizer will receive an email stating that the permission request needs to be approved or declined.
Part 1: This contains the link to the Permissions Manager where the authorizer will grant or decline permission to a folder.
Part 2: This contains the information about the request such as the name of the user requesting permission, the folder they wish to have access to, permission level, and reason.
The rest of the email contains frequently asked questions which are sent with every permission request email and can be helpful.
Click the link at the top to proceed to the Permission Approval area of the Permissions Manager site.
Permissions Manager Approve/Deny Request Screen
The top of the screen is very important. It displays the Request Type. In many cases it will be Grant Access, but in some cases it may say Revoke Access.
If a user already has access to a folder and another request is made to revoke access for a user to that folder make sure you are approving the correct action. If you approve a Revoke request, that user will no longer have permission to that folder. If you decline a Revoke request, the means the user will still have their current permissions.
Explanation of Page Layout:
Permission Request Email Update
Once a permissions request is approved or declined for a user an email will be sent to that user.
Part 1: The request type (i.e. Grant or Revoke).
Part 2: Whether the request was approved or declined.
Part 3: A link that goes to the permissions site and displays, in more detail, information on the request.
The rest of the email contains additional instructions and information that is useful such as mapping a network drive to a computer and contact information.
Permissions Manager Request Status Screen:
- If you would like to see who has permissions to a particular folder you can click on the Management tab on the left side of the screen. Then underneath Management click Directory Authorizer:
- On the Management screen under the Managed Directories - Folder Name column click on the folder you would like to look into:
- Then under the Permissions - Display Name column click the + next to the name of the group you are interested in to see all the users with permissions to that folder as well as when their permissions expire:
The other groups that may appear under the initial folder you picked are groups from the I.S. department. They manage the whole permissions program and are included in many folders. Do not worry about them being listed under your folders and groups.
Getting additional help
If there are still any issues after reading these instructions and any help is still needed please email email@example.com for further assistance.