You can control access to your repository by locking files, establishing connection security, and restricting folder permissions.
Lock and unlock jobs and transformations
You can lock or unlock jobs and transformations. Locking and unlocking jobs and transformations protect them from being edited by other users.
Lock a job or transformation
In the Browse tab in the Repository Explorer window, right-click the job, or transformation and select Lock.
Enter the notes in the Lock Notes window that appears.
Click OK.The job or transformation icon changes to show a padlock.NoteThe lock status icons are updated on each PDI client only when the Repository Explorer is accessed. If you want to refresh lock status in the Repository Explorer, exit and access it again. Also, to select more than one file, hold down the CTRL or the SHIFT key as you select the folders, jobs, or transformations.
View lock notes
In the Browse tab in the Repository Explorer window, right-click the job, or transformation and select Lock Notes.The lock note appears in a pop-up window.
Click OK to dismiss the note.
Unlock a job or transformation
In the Browse tab in the Repository Explorer window, right-click the job, or transformation,
Select Lock.The icon for the job or transformation returns to normal; the padlock icon disappears.NoteTo select more than one file, hold down the CTRL or the SHIFT key as you select the folders, jobs, or transformations.
Access connection, security, and cluster information
In addition to managing content such as jobs and transformations, click the Connections tab to manage (create, edit, and delete) your database connections in the Pentaho Repository. See Manage repositories in the PDI client for more information about connecting to a database.
Click the Security tab to manage users and roles. Pentaho Data Integration comes with a default security provider. If you do not have an existing security such as LDAP or MSAD, you can use Pentaho Security to define users and roles. You must have administrative privileges to manage security. For more information, see the section called User security.
You can manage your slave servers (Pentaho and Carte instances) by clicking the Slaves tab. See Initialize Slave Servers for instructions.
Click the Partitions and Cluster tabs to manage partitions and clusters. See Create a cluster schema for more information.
Set folder-level permissions
|Read||If set, the content of the file or contents of the directory will be accessible. Allows execution.|
|Manage Access Control||If set, access controls can be changed for this object.|
|Write||If set, enables read and write access to the selected content.|
|Delete||If set, the content of the file or directory can be deleted.|
You can assign any of these permissions to files and folders stored in a Pentaho Repository. Setting permissions manually overrides inherited permissions if the access control flags allow.
Perform the following steps to set folder-level permissions:
Open the Repository Explorer ( ).
Navigate to the folder to which you want permissions set and click to select it.The folder must appear in the right pane before you can set permissions.
In the lower pane, under the Permissions tab, disable Inherit security settings from parent.
Click Add to open the Select User or Role dialog box.
Select a user or role to add to the permission list.
Use the yellow arrows to move the user or role in or out of the permissions list.
Click OK when you are done.
In the lower pane, under the Access Control tab, enable the appropriate Permissions granted to your selected user or role.
If you change your mind, use Delete to remove users or roles from the list.
Click Apply to apply permissions.