Folder Security

This section provides reference information about the security processes applicable for different features available for folders.

Table 1. Matrix of Security ProcessesThe table displays the matrix of the security processes to be ascertained while working with engineering folders.
DescriptionTypeDetailReadShowModifyFrom Connect To Connect From DisconnectTo DisconnectCreateChange OwnerDelete
Insert new Folder under RootRootParentY YDoneY
Folder ChildYYYYY
Insert new Folder under FolderFolderParentYYDoneY
FolderChildYYYYY
Insert existing Reference under FolderFolderParentYYDoneY
ReferenceChildYY
Insert existing Reference under FolderFolderParentYYDoneY
RepresentationChildYY
Insert latest revision under FolderFolder ParentYYDoneY
ReferenceOldYY
ReferenceNewYY
Replace by latest revision under FolderFolderParentYYDoneYY
ReferenceOldYY
ReferenceNewYY
Create new Root FolderRoot FolderOwnYYYY
Transfer OwnershipFolderOwnYYYY
Delete Root Folder with Folder Root Folder Parent YYYY
Folder Child YYYY
Delete Root Folder without Folder Root Folder Own Y Y Y
Delete Leaf Folder Folder Parent Y Y DoneY
Folder Child Y Y YY
Delete No-Leaf Folder FolderParent Y Y DoneY
FolderOwn (or Non Leaf Child) Y Y Y YY
FolderChild (Leaf) Y Y YY
Modify PLMExternalID FolderOwnY Y Y
Modify Description FolderOwnY Y Y
Lock Folder Folder OwnYY
Unlock Folder Folder Parent
Folder OwnY Y
Lock Root Folder Root Folder Own Y Y
Copy Paste Folder Folder Source YY
Reference Source Y Y
Folder Destination Y Y DoneY
Cut Paste folder Folder SourceY YDoneYY
Folder DestinationY YDoneY

Security Process Legend

Done represents security processes conducted.
Y represents security processes to be executed for different features.
represents security process having no impact.