Prevent a users with a custom role from seeing incidents outside an assignment group

snow2p
Tera Expert

Hi,

I have a custom role called "aa_test" that only needs to see and update incidents with an assignment group "Network".  I have setup a data filtration record below which works with side effect that are more than I bargained for:

snow2p_0-1735932549677.png

It works so that users with that role can only see "Network" assignment group, but it also prevents admin, and other users from seeing anything but the "Network" assignment group incidents.

 

I tried to follow the instructions from the community post here to also exclude the itil role, but Role Criteria and subject criteria appear to allow 'is' conditions but not 'is NOT' conditions, at least for me.

 

Can someone suggest and show a screenshot of how I can limit views by my custom role AND still allow other roles to be unaffected?

1 ACCEPTED SOLUTION

snow2p
Tera Expert

In case anyone cares, I was able accomplish this with the following ACLs AND I was able to do this without code, per my original desire.

ACLs for the my custom role:

  • incident(read)
  • sys_db_object(read)
  • sys_db_object.*(read)
  • sys_dictionary(read)
  • sys_dictionary.*(read)

The incident (read) ACL has a data condition that provided the limitation that finally worked.

snow2p_0-1741996639434.png

 

View solution in original post

6 REPLIES 6

Your solution seems simple and clean and might be the fallback position if I can't get a no code version of the BR or data filtration working. I'd like to find a no code solution if possible as I'm trying to eliminate the risk of leveling knowledge of ServiceNow coding.  Not all admins can develop in ServiceNow and I can't guarantee that I'll have an admin with developer skills.

snow2p
Tera Expert

In case anyone cares, I was able accomplish this with the following ACLs AND I was able to do this without code, per my original desire.

ACLs for the my custom role:

  • incident(read)
  • sys_db_object(read)
  • sys_db_object.*(read)
  • sys_dictionary(read)
  • sys_dictionary.*(read)

The incident (read) ACL has a data condition that provided the limitation that finally worked.

snow2p_0-1741996639434.png