CAUAJM_W_10439 No policies granting access to resource
search cancel

CAUAJM_W_10439 No policies granting access to resource

book

Article ID: 137234

calendar_today

Updated On:

Products

CA Workload Automation AE - Business Agents (AutoSys) CA Workload Automation AE - System Agent (AutoSys) CA Workload Automation AE - Scheduler (AutoSys) Workload Automation Agent Autosys Workload Automation

Issue/Introduction

Customers receiving the below error message when attempting to execute AutoSys client utilities (sendevent, autorep, autoping, etc.) will need to review EEM policies for the specified user as the EEM is denying required access; in this case execute.


autoping -m bullwinkle
 
CAUAJM_I_50023 AutoPinging Machine [bullwinkle]
CAUAJM_I_50025 AutoPing WAS SUCCESSFUL
autoping -m bullwinkle
  
CAUAJM_I_50023 AutoPinging Machine [bullwinkle]
CAUAJM_I_50025 AutoPing WAS SUCCESSFUL


autorep -m bullwinkle

 CAUAJM_W_10423 Machine Read Access Denied!

CAUAJM_W_10439 No policies granting access to resource.

CAUAJM_W_10440 Class: as-machine Resource: DV2.bullwinklea User: batchuser Access: read


autorep -G Test
 
CAUAJM_W_10411 Global Variable Read Access Denied!
CAUAJM_W_10439 No policies granting access to resource.
CAUAJM_W_10440 Class: as-gvar Resource: DV2.Test User: batchuser Access: read
CAUAJM_W_10442 Time: 1568818034  Delegator: None


Environment

Release : 11.3.6

Component : CA Workload Automation AE (AutoSys)

Resolution

Issue is related to security permissions for the specified user. 

The user is not granted the necessary rights to be able to execute the commands that you specified. User must be granted execute permissions in EEM


CAUAJM_W_10439 No policies granting access to resource.


Log in to your EEM console and find the classes that are noted in the error messages and change access to execute 


Below is example of error message that tell you the class that you need to review:

CAUAJM_W_10440 Class: as-machine Resource: DV2.bullwinkle User: batchuser Access: read

CAUAJM_W_10440 Class: as-gvar Resource: DV2.Test User: batchuser Access: read


Once you make the necessary changes to the policy, you can run the "permission check" within EEM after to make sure the user gets an ALLOW and not a DENY.