NIH | National Cancer Institute | NCI Wiki  

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Before NBIA users can be created, an administrator with access to the User Authorization Tool must register the NCIA application and assign an administrative user to the NCIA application there. The administrator can then assign users to NBIA and roles to each user. The following table describes the role structure in NBIA.

Role

Functionality

Can Perform Operation

NCIA.READ

Search capability

Everything else

Note: This role is applied to guest users.

NCIA.MANAGE_VISIBILITY_STATUS

Privilege to access Access the QC Tool

Use the QC Tool

NCIA.VIEW_SUBMISSION_REPORT

Privilege to access Access and verify a submission

View Submission Report

NCIA.MANAGE_COLLECTION_DESCRIPTION

Privilege to edit Edit a collection description

Edit Collection Description

NCIA.SUPER_CURATOR

Create, edit, and delete workflow items

Review and delete saved queries

Approve Privilege to approve the deletion of image series

Delete a shared list

Manage Workflow Items

Manage Saved Queries

Approve Deletions

Manage Shared List

NCIA.DELETE_ADMIN

Privilege to delete Delete images approved for deletion

Perform Online Deletion

NCIA.ADMINPrivilege to use Use the User Authorization Tool

Use the User Authorization Tool

Note: this This role is also needed to access CSM UPT.

The roles you assign allow a user to perform tasks in NBIA. Additionally, an administrator can perform the following tasks:

...

For more information about creating new NBIA users/user groups and performing other tasks in the User Authorization Tool, see the User Authorization Tool documentation.

Note that guest users get read but are not in the database and you get access to restricted collections through PEs.

Return to top of page

Using the QC Tool

...

Using the User Authorization Tool

NBIA role required to use this feature: NCIA.ADMIN

For more information about roles, see Creating a New NBIA User.

Administrators use the User Authorization tool to manage data access by users, user groups, protection groups, and roles.

...

Include Page
Managing Protection Elements 7.45
Managing Protection Elements 7.45

Return to top of page

Managing Protection Groups

...