Customers receiving the below error message when attempting to execute AutoSys client utilities (sendevent, autorep, autoping, etc.) will need to review EEM policies for the specified user as the EEM is denying required access; in this case execute.
autoping -m bullwinkle
CAUAJM_I_50023 AutoPinging Machine [bullwinkle]
CAUAJM_I_50025 AutoPing WAS SUCCESSFUL
autoping -m bullwinkle
CAUAJM_I_50023 AutoPinging Machine [bullwinkle]
CAUAJM_I_50025 AutoPing WAS SUCCESSFUL
autorep -m bullwinkle
CAUAJM_W_10423 Machine Read Access Denied!
CAUAJM_W_10439 No policies granting access to resource.
CAUAJM_W_10440 Class: as-machine Resource: DV2.bullwinklea User: batchuser Access: read
autorep -G Test
CAUAJM_W_10411 Global Variable Read Access Denied!
CAUAJM_W_10439 No policies granting access to resource.
CAUAJM_W_10440 Class: as-gvar Resource: DV2.Test User: batchuser Access: read
CAUAJM_W_10442 Time: 1568818034 Delegator: None
Release : 11.3.6
Component : CA Workload Automation AE (AutoSys)
Issue is related to security permissions for the specified user.
The user is not granted the necessary rights to be able to execute the commands that you specified. User must be granted execute permissions in EEM
CAUAJM_W_10439 No policies granting access to resource.
Log in to your EEM console and find the classes that are noted in the error messages and change access to execute
Below is example of error message that tell you the class that you need to review:
CAUAJM_W_10440 Class: as-machine Resource: DV2.bullwinkle User: batchuser Access: read
CAUAJM_W_10440 Class: as-gvar Resource: DV2.Test User: batchuser Access: read
Once you make the necessary changes to the policy, you can run the "permission check" within EEM after to make sure the user gets an ALLOW and not a DENY.