Community Tip - Visit the PTCooler (the community lounge) to get to know your fellow community members and check out some of Dale's Friday Humor posts! X
I will provide simple troubleshooting techniques that will assist you in identifying potential access related issues in your Windchill system. Have you ever wondered:
Let’s get started.
Windchill system behavior is based on a context or container model. The site context represents the system as a whole, whereas an Organization is a component of the Site and Products, Libraries, Projects and Programs are part of the Organization.
Each of these contexts uses a cabinet to store data and system objects.
Cabinets are associated with Windchill objects called Domain which store policies and access rules.
The chart below illustrates the default Domain Architecture; for a more detailed description please view article CS212423 in our PTC Support Knowledge Base.
Domain structuring in conjunction with inheritance enables general policies to be applied at higher domains and more specific policies to be applied at a lower level.
When debugging Access Control you not only have to consider inherited policies from higher contexts, but also keep in mind how Windchill will evaluate Security Labels, Access Permissions on Groups and individuals as well as Ad-Hoc Permissions.
The following algorithm is generally applied:
If you are interested in more details, please check in the Windchill Help Center in chapter “How ACLs work:” there you will find additional examples for a better understanding.
Now that you have a clear understanding on how Windchill calculates access permissions, I will concentrate troubleshooting ACL related issue. In Technical Support, most cases that are opened by customers fall into three categories:
We will concentrate in this post on the first category.
Access related error messages come in many flavors. See below the most common ones that show up in the Windchill user interface or in the Method Server logs:
If you see one of these error messages, it is the time when you have to answer the question:
Is this intentional or should this user have access to the object?
To help you answer this question PTC provides you help with 3 tools:
Thanks for your attention and any questions or feedback is welcome.