This section describes how you can edit a scenario's security settings from the Scenario Manager.
You can only edit the properties of a scenario if you are its owner or if you have full access to the scenario. The Actions available depend on the status of the item selected in the right hand pane.
Certain Custom Scenario Types may not permit some operations. For more, see Custom Scenario Types in the Xpress Insight Mosel Developers Guide.
You would edit the security settings of a scenario to change the sharing status or the owner.
- From the HOME page, select the app in which you want to edit the properties of a scenario.
The
APP page is displayed.
- Click the shelf to open the Scenario Manager.
- In the folder list (displayed in the left pane) select the folder containing the scenarios you wish to use.
- In the right hand pane, select the scenario you want to edit. In the Actions menu, click Security.
- To change how the scenario is shared between users, click Sharing. Select one of the following options in the list.
- Private—No sharing with other users.
- Shared read only—Other users can view the scenario but cannot modify or delete it.
- Full access—Other users can view, modify, and delete the scenario.
- To assign the scenario to a user, select one of the options in the Owner list.
Click
SAVE. A confirmatory dialog displays the number of items affected by the change. Click
PROCEED. If applicable, a progress dialog will display.
- Click CLOSE to close the Security dialog.
© 2001-2024 Fair Isaac Corporation. All rights reserved. This documentation is the
property of Fair Isaac Corporation (“FICO”). Receipt or possession of this documentation does not
convey rights to disclose, reproduce, make derivative works, use, or allow others to use it except
solely for internal evaluation purposes to determine whether to purchase a license to the software
described in this documentation, or as otherwise set forth in a written software license agreement
between you and FICO (or a FICO affiliate). Use of this documentation and the software described in
it must conform strictly to the foregoing permitted uses, and no other use is permitted.