NOTE: To perform operations on this page, the user signed in to Control Center must be a member of the NRTADMIN group, or be assigned to a role with Tier 1 or Tier 2 access to Control Center. For more information about the specific operations allowed, refer to Understanding tiers.

The Workspaces page lets you search for workspaces using various search criteria, and perform the following actions to manage workspaces:

  • Verify user access rights for the selected workspace using the Check Effective Access feature.

  • Verify user access rights based on the groups assigned in the access control list (ACL) using the Security feature.

  • View the details of a workspace using the View feature.

  • Copy a link to one or more workspaces using the Copy Link option.

  • View generic table options in the User interface overview section.

Searching for workspaces

  1. Select Content > Workspaces. The list of default search fields appears as shown in the following figure:

    Workspaces page.png
  2. Use these search fields to refine your search, then select Search.

    To add more search criteria, select Add Search Criteria.

    With the Search button enabled, the Clear values option is displayed.

    In the preceding figure, the Hide Search Criteria toggle option is displayed.

    • To hide the search criteria and focus only on the list of filtered documents, select Hide Search Criteria.

    • Selecting Hide Search Criteria changes it to Show Search Criteria. Select this to view the search criteria list.

NOTE: For performance reasons, search results are limited to 10,000 items. If your search exceeds 10,000 results, refine the search with additional criteria.

You can alternatively perform searches without the 10,000 result limitation using the iManage Work Universal (REST v2) API.

iManage Control Center preserves the search fields you enter when searching for documents, workspaces, or Trash. When you add or remove search fields, your settings are automatically saved and will be present the next time you sign in and access the Documents, Workspaces, or Trash pages. This provides the advantage of not having to remember or reselect your search fields for subsequent searches.

Search fields are stored locally in the browser's cache for each library. If you switch to a different browser or to a different device, you'll see the default search fields.

Checking Effective Access

To verify the access rights of a user for a selected workspace, use the Check Effective Access option. It evaluates all permissions (container default security, access permission, group memberships, and role abilities) and is available on the:

  • Ribbon bar: Select a workspace to see this option on the ribbon bar.

  • Kebab menu: Select the  icon next to each workspace to see this option.

  • Context menu: Right-click a workspace name to see this option.

Use one of the preceding options to check the effective access of the workspace.

  1. Right-click a workspace and select Check Effective Access. The following dialog is displayed.

    Check Effective Access.png
  2. Enter a user name or ID. A suggestion list appears.

  3. Select a user. You’ll see the access right of the selected workspace. 

Verifying security

To verify access permissions for the users and groups assigned in the Access Control List (ACL), you can use Security option. It’s available on the:

  • Ribbon bar: Select a workspace to see this option on the ribbon bar.

  • Kebab menu: Select the  icon adjacent to each workspace to see this option.

  • Context menu: Right-click a workspace name to see this option.

Right-click a workspace and select Security. The security details for the workspace is displayed. The following figure provides an example.

Security.png

Viewing workspace details

To view the details of a workspace, use this View option. It's available on the:

  • Ribbon bar: Select a workspace to see this option on the ribbon bar.

  • Kebab menu: Select the  icon next to each workspace to see this option.

  • Context menu: Right-click a workspace name to see this option.

  • Clickable link: In the Doc #/Version column, select a workspace.

Use one of the preceding options to view the following workspace details:

  • Library

  • Name

  • Owner

  • Created On

Bulk security update

NOTE: To perform bulk security updates on documents, the user must be a member of the NRTADMIN group. For more information, refer to Creating an NRTADMIN User.

This section includes the following topics:

Edit user/group permissions

Workspaces are shown on the iManage Control Center Workspaces page after performing a search using one or more search criteria. The figure below shows the options available when a workspace is selected from the search results list.

Figure 201 - Workspaces page.png

For a single workspace, the Edit user/group permissions option lets you:

  • Add single or multiple users or groups, and define their access level to the workspace.

  • Change the access level of existing users or groups who already have access to the workspace, to another level of access.

  • Update the default security​ settings.

  • Update the security of the contents of the workspace, including folders and documents.

  • Update the security of documents referenced in multiple folders.

  • Update the security of all versions of documents, to which you have full access.

Follow these steps to add users or groups to workspaces and set their security access level:

  1. On the Workspaces page, select a workspace from the search results list.

  2. On the right-click context menu, kebab, or toolbar menu, select Edit user/group permissions.

    Figure 202 - Edit User Group Permissions 1.png
  3. In the Edit user/group permissions dialog, to update the default security of the workspace, select one of the following options from the Default Security drop-down list: 

    • Public: All users have read/write access to the workspace.

    • Private: Only the owner and those who are specifically granted permission can access the workspace.

    • View: All users can access the workspace, but aren’t allowed to edit the content.

  4. To add a user or group, enter the name of the user(s) or group(s) in the search box.

  5. After adding user(s) or group(s), define their access level using the access level drop-down list. Choose from:

    • Full Access

    • Read/Write

    • Read Only

    • No Access

  6. To remove a user group group, select the X next to the access level drop-down list.

  7. Perform one of the following actions:

    • If you want to apply the security and access level changes to just the workspace, select Save. Success or failure of the security update is shown in a pop-up dialog.

    • If you want to apply the security and access level changes to the workspace and its contents, select Apply security changes to contents, then select Save. Continue with the next step.

  8. The Apply security changes to contents dialog opens and displays a summary of the security changes and provides options for applying the changes to subfolders, private items, document versions, and document locations.

    Figure 205 - Apply security changes to contents 1.png
    1. Select one of the following security options:

      • Apply changes only: This applies the changes made to the security profile of the workspace to all the content within the workspace.

      • Overwrite security: This overwrites the existing security profile of all the content within the workspace, including default security, users, and groups, with the security profile of the workspace.

    2. In the read-only Security Changes panel, review the default security setting and user/group access level assignments.

    3. In the Exceptions & Settings panel, specify how the security changes will be applied to subfolders, private items, document versions, and multi-location files. Refer to Workspace and folder security options for a description of each option.

    4. Select Apply.

      The status of the Apply security changes to contents action is available in the Notifications panel, accessible through the bell icon.

      Figure 206 - Notifications 1.png
  9. (Optional) To view the details of the Apply security changes to contents action, select the job in the Notifications panel to open the Report: Apply security changes to contents dialog. Action outcomes are described in Outcomes of bulk security update actions.

    Figure 207 - Report Apply security changes to contents 1.png
  10. (Optional) To download a report containing the details of each item updated as part of an Apply security changes to contents action in .csv format, select Download Report. Permission changes requested as part of the action are also listed in the beginning of the report. You can also view the properties of updated items by selecting the document number in the Report: Apply security changes to contents dialog.
    An example of the Apply security changes to contents report is shown below.

    Figure 221 - Apply security changes to contents report.png

View and update Workspace folder security

In the workspace search results list, you can select a workspace to view its folder structure and the security details for each folder. Additionally, you can edit the default security settings of a folder and define access levels for users and groups.

This section includes the following topics:

View folder security

To view workspace folder details, select Folder on the right-click context menu, kebab, or toolbar menu of the Workspaces page.

Figure 201 - Workspaces page.png

The Folder tab on the workspace details page shows the folder structure of the workspace in the left pane. You can view subfolders by expanding the parent folder.

For a selected folder, the right pane of the Folder tab shows:

  • The default security setting applied to the folder.

  • The users and groups who have explicit access to the folder, along with their assigned access levels.

Figure 211 - Workspaces Folder tab.png

Update folder security

Follow these steps to change the security settings of a folder:

  1. Select Folder on the right-click context menu, kebab, or toolbar menu of the Workspaces page.

  2. On the Workspace details page, select Edit in the Security section of the Folder tab.

    Figure 211 - Workspaces Folder tab.png

The Edit user/group permissions dialog opens.

Figure 212 - Edit User Group Permissions 1.png
  1. (Optional) To inherit security from the parent folder, select Inherit security from parent folder.

NOTE: When Inherit security from parent folder is selected, the following fields are read-only and can’t be changed through the Edit user/group permissions dialog:

  • Default Security

  • Users/Groups with Permissions

  1. To update the default security of the folder, select one of the following options from the Default Security drop-down list: 

    • Public: All users have read/write access to the folder.

    • Private: Only the owner and those who are specifically granted permission can access the folder.

    • View: All users can access the folder, but can’t edit the content.

  2. To add a user or group, enter the name of the user(s) or group(s) in the search box.

  3. After adding user(s) or group(s), define their access level using the access level drop-down list. Choose from:

    • Full Access

    • Read/Write

    • Read Only

    • No Access

  4. To remove a user group group, select the X next to the access level drop-down list.

  5. Perform one of the following actions:

    • (Optional) To apply the security and access level changes to just the folder, select Save. Success or failure of the security update is shown in a pop-up dialog.

    • (Optional) To apply the security and access level changes to the folder and its contents, select Apply security changes to contents, then select Save. Continue with the next step.

  6. The Apply security changes to contents dialog opens and displays a summary of the security changes and options for applying the changes to subfolders, private items, document versions, and document locations.

    Figure 215 - Apply security changes to contents 1.png
    1. Select one of the following security options:

      • Apply changes only: This applies the changes made to the security profile of the workspace to all the content in the workspace.

      • Overwrite security: This overwrites the existing security profile of all the content in the workspace, including default security, users, and groups, with the security profile of the workspace.

    2. In the read-only Security Changes panel, review the default security setting and user/group access level assignments.

    3. In the Exceptions & Settings panel, specify how the security changes will be applied to subfolders, private items, document versions, and multi-location files. Refer to Workspace and folder security options for a description of each option.

    4. Select Apply.

      The status of the Apply security changes to contents action is available in the Notifications panel, accessible through the bell icon.

      Figure 206 - Notifications 1.png
  7. (Optional) To view details about the action, select the job in the Notifications panel to open the Report: Apply security changes to contents dialog. Action outcomes are described in Outcomes of bulk security update actions.

    Figure 216 - Report Apply security changes to contents 2.png
  8. (Optional) To download a report containing the details of each item updated as part of an Apply security changes to contents action in .csv format, select Download Report. Permission changes requested as part of the action are also listed in the beginning of the report. You can also view the properties of the updated items by selecting the document number in the Report: Apply security changes to contents dialog.
    An example of the Apply security changes to contents report is shown below.

    Figure 221 - Apply security changes to contents report.png

Workspace and folder security options

Each option in the Exceptions & Settings section in the Apply security changes to contents dialog is explained in the table below.

Table: Workspace content security change options

Security tier

Options

Action

Subfolders

Include subfolders that do not inherit parent security

Updates the security of subfolders and their contents that don't inherit security from the parent folder.

Private items

Skip security changes to Private items

Selecting this option won't change the security settings of items whose default security is Private, whether they are secured or restricted.

Document versions

Change all versions

Selecting this option updates the security of all versions of the documents to which you have Full Access rights.

Change only selected version

Selecting this option updates the security of only the selected/specific version of the documents.

Multi-location files

Skip security changes

Selecting this option doesn't update the security of documents referenced in multiple locations.

Change security

Selecting this option updates the security of documents referenced in multiple locations.

bulk security update actionsOutcomes of

When performing a bulk update action, the outcome of an individual item is described in the table below.

Table: Bulk update action outcomes

Status

Reason

Description

Succeeded

Security changes requested

All security changes requested were successful for the workspace.

Skipped

Nothing to update

Security changes requested are already present in the workspace.

No record found

  • The workspace doesn't exist or you don't have sufficient access to it.

  • The document number is highlighted in red.

In use by other users

The document is in use by another user.

Insufficient permissions

You don't have permissions to change the security (Full access required).

Due to multiple locations settings

Documents referenced in multiple folders are skipped because Skip security changes is selected under Multi-location files.

Due to private item settings

Private documents are skipped because a skip option is selected under Private items.

Failed

Exception

Didn't update security due to an exception.