Unit 6 - Notes
INT346
Unit 6: Automation Anywhere Control Room and Security
1. Overview of the Control Room
The Control Room is the centralized, web-based management server for the Automation Anywhere Enterprise platform (specifically Automation 360/A2019). It acts as the "brain" or "heart" of the RPA architecture, providing a single point of access to manage the entire workforce of digital workers (bots).
core Functions
- Centralized Management: Manages users, roles, and licenses.
- Repository: Stores and version-controls all bots (automations).
- Deployment: Orchestrates the execution of bots across various environments (Dev, Test, Prod).
- Security: Enforces access controls and manages credentials securely.
- Analytics: Provides real-time operational and business insights.
2. Key Features, User Interface, and Navigation
The Control Room interface is designed for accessibility via a standard web browser. The navigation is typically organized via a left-hand sidebar menu.
Key Interface Modules
- Dashboard:
- Home Dashboard: Provides a visual snapshot of the automation program, including total bots, accumulated time saved, and success/failure rates.
- Devices Dashboard: Shows the status of Bot Runners and Bot Creators (Connected, Disconnected, Offline).
- Audit Dashboard: Displays recent activities for compliance monitoring.
- Activity:
- In Progress: View currently running automations.
- Scheduled: View and manage upcoming bot runs.
- Historical: Review past execution logs.
- Bots (Automation):
- My Bots: The workspace for Bot Creators (Private repository).
- Public: The centralized repository for production-ready bots (Public repository).
- Credentials: Access to the Credential Vault.
- Devices:
- Manages the machines (Bot Runners/Creators) connected to the Control Room.
- Workload:
- Manages Workload Management (WLM) queues for distributing work items across multiple bots.
- Administration:
- Settings for licenses, email notifications, users, roles, and security policies.
The Repository Model
- Private Repository: Accessible only to the specific user (Bot Creator). Bots here are in development.
- Public Repository: Accessible to other users based on permissions. Bots must be "Checked In" from Private to Public to be deployed or shared.
3. User Management: Roles, Permissions, and Access Control
Automation Anywhere uses a hierarchical user management system to ensure security and segregation of duties.
User Roles
A Role is a collection of permissions. Users are assigned roles, not individual permissions.
- System-Defined Roles (Out-of-the-box):
- AAE_Admin: Super user with full access to settings, users, and licensing.
- AAE_Basic: Standard user (often used for Bot Runners).
- AAE_Bot Developer: Has permissions to create and edit bots.
- AAE_Bot Runner: Has permissions to execute bots but not edit them.
- AAE_Locker Admin: Manages the Credential Vault lockers.
- Custom Roles: Administrators can create specific roles (e.g., "Finance Dept Runner") to restrict access to specific folders or bots.
User Types (Licenses)
- Bot Creator: A user with a development license to build and test bots.
- Bot Runner (Attended): A user who triggers bots on their local machine to assist with tasks.
- Bot Runner (Unattended): A server-level user where bots run automatically via schedule/trigger without human intervention.
RBAC (Role-Based Access Control)
RBAC is the methodology used to restrict system access to authorized users.
- Principle: Permissions are assigned to roles Roles are assigned to users.
- Granularity: Permissions can be set at the folder level (e.g., User A can see the "HR Bots" folder but not the "Finance Bots" folder).
4. Bot Deployment, Scheduling, and Triggering
Once a bot is developed, it must be deployed to a Bot Runner. This is managed through the Control Room.
Bot Lifecycle (Check-in/Check-out)
- Check-In: A developer moves a bot from their Private repository to the Public repository. This creates a version history.
- Check-Out: A developer moves a bot from Public to Private to make edits. This locks the file in Public so others cannot edit it simultaneously.
Deployment Methods
- Run Now: Immediate execution of a bot on a selected device.
- Schedule:
- One-time: Run once at a specific date/time.
- Recurring: Run daily, weekly, or monthly (e.g., "Every Friday at 5 PM").
- Allows handling of time zones and "missed run" policies (e.g., if the machine was off, should it run immediately upon boot?).
- Triggering:
- Bots execute based on external events rather than time.
- Types of Triggers: File creation (running a bot when a CSV is dropped in a folder), Email arrival, Service start/stop, Window open/close.
Workload Management (WLM)
For high-volume processing, WLM allows the Control Room to distribute work items (e.g., 10,000 invoices) from a Queue across a pool of Bot Runners dynamically.
5. Bot Insights: Monitoring and Reporting
Bot Insights is the integrated analytics engine that provides real-time visibility into the digital workforce.
Types of Dashboards
- Operational Dashboard:
- Focuses on the health of the system.
- Metrics: CPU utilization, memory usage, bot heartbeat, success vs. failure counts, average execution time.
- Audience: IT Support, RPA Center of Excellence (CoE).
- Business Dashboard:
- Focuses on the value generated by the bots.
- Metrics: Total invoices processed, total dollar value handled, hours saved (converted to ROI).
- Audience: Business Managers, Stakeholders.
Logging and Reporting
- Audit Logs: Records every action taken in the Control Room (User login, Bot creation, Bot deployment, User modification). Essential for compliance.
- Task Logs: Detailed step-by-step logs of bot execution (Start time, End time, Line number of error).
- Snapshots: Upon failure, the Control Room can capture a screenshot of the Bot Runner's desktop to aid debugging.
6. Security: Credential Vault and Compliance
Security is the most critical component of Enterprise RPA, as bots often handle sensitive data (passwords, PII, financial data).
Credential Vault
The Credential Vault is a secure, centralized storage facility for sensitive information. It ensures that credentials (usernames/passwords) are not hard-coded inside the bot scripts.
Architecture of the Vault
- Credential: The actual key-value pair (e.g., Key:
SAP_Login, Username:BotUser, Password:***). - Locker: A logical container that groups credentials together (e.g., "Finance Locker", "HR Locker").
- Attributes: Specific details within a credential (URL, Hostname, Password).
Vault Roles
- Locker Admin: Can create lockers and assign owners. Cannot see the passwords inside.
- Locker Owner: Can add credentials to the locker and grant access to consumers.
- Locker Consumer: Can use the credentials within a bot (runtime access) but cannot view the password text.
- Locker Participant: Can view the credentials (used for developers who need to verify details).
Security Architecture Layers
- Network Security: Control Room communicates with Bot Runners via TLS 1.2 (HTTPS/WSS).
- Data at Rest: All data in the database and Credential Vault is encrypted (AES-256).
- Application Security: RBAC, Password policies, Two-Factor Authentication (2FA), and SAML (SSO) integration.
7. Compliance and Best Practices
Compliance
RPA must adhere to regulations like GDPR, SOX, and HIPAA.
- Non-Repudiation: The Audit Log ensures that actions cannot be denied by the user who performed them.
- Version Control: Keeps a history of bot changes to prove that the code running in production is the approved code.
- Segregation of Duties: Ensure the person who develops the bot (Dev) is not the same person who approves it for production (Admin).
Security Best Practices
- Never Hardcode Credentials: Always use the Credential Vault.
- Least Privilege Principle: Give users only the minimum permissions necessary to perform their job.
- Separate Environments: Maintain distinct Control Room environments for Development, Testing (UAT), and Production.
- Regular Rotation: Automate the rotation of passwords stored in the Credential Vault.
- Secure Recording: Disable "Secure Recording Mode" or exclude sensitive applications during recording to prevent capturing PII in screenshots.
8. Real-World Use Cases
Use Case 1: Financial Close Process (Scheduling)
- Scenario: At the end of every month, the finance team must download bank statements and reconcile them with the ERP.
- Implementation: A bot is scheduled in the Control Room to run at 11:00 PM on the last day of every month.
- Control Room Feature: Scheduled Deployment.
Use Case 2: Employee Onboarding (Triggering & Security)
- Scenario: When a new hire form is dropped into a shared folder, IT needs to create accounts in Active Directory and Salesforce.
- Implementation: A trigger monitors the folder. When the file arrives, the bot launches. It retrieves the Salesforce admin password from the Credential Vault to log in securely.
- Control Room Feature: File Trigger and Credential Vault.
Use Case 3: Invoice Processing (Workload Management)
- Scenario: A company receives 5,000 invoices on Monday morning. One bot takes too long to process them.
- Implementation: The invoices are uploaded to a Control Room Workload Queue. A pool of 10 Bot Runners connects to the queue and processes the invoices in parallel.
- Control Room Feature: Workload Management (WLM).