Setting Up Agile Planner → System Settings → Security → Groups
The Groups tab is used to define the security groups, to specify the users and groups who belong to them, and to specify the security roles to which they are associated. Security groups are a collection of users and/or other security groups that have similar roles in your organization and similar needs for accessing work item data. Without using security groups, every user would need to be individually given permission to access the various modules and views. With groups, you can assign multiple users with similar roles and permission requirements to a single security group, and you can then assign a single security group permission to access a module or a view. Users can be assigned to more than one security group. If a user is assigned to more than one security group, that user has all the permissions associated with all the groups to which they are assigned.
Several default security groups are included. If these groups aren't the right ones for how your organization wants to work, you can add new ones.
You can assign users and security groups to security groups. Security groups are given permission to access modules and views by assigning the security group to one or more security roles.
You can add a security group by copying the properties of an existing security group. When you copy a security group, the users and/or security groups that are assigned to the security group from which the copy is made will also be copied.
If your organization doesn't need a security group, you can delete it.
Make your changes and then save them.
You can import users from an existing network directory service, such as Active Directory or Novell eDirectory. You must first set up the authentication provider, which determines which users and/or security groups will be imported. You can configure the authentication provider to be run periodically. When the authentication provider is re-run, only new or changed data will be imported. First name, last name, status, and email address are used to determine which users are new and/or have been changed. A user's username, password, domain, and authentication provider will remain unchanged.