Unit 6 - Notes

INT346

Unit 6: Automation Anywhere Control Room and Security

1. Overview of the Control Room

The Control Room is the centralized, web-based management server for the Automation Anywhere Enterprise platform (specifically Automation 360/A2019). It acts as the "brain" or "heart" of the RPA architecture, providing a single point of access to manage the entire workforce of digital workers (bots).

core Functions

  • Centralized Management: Manages users, roles, and licenses.
  • Repository: Stores and version-controls all bots (automations).
  • Deployment: Orchestrates the execution of bots across various environments (Dev, Test, Prod).
  • Security: Enforces access controls and manages credentials securely.
  • Analytics: Provides real-time operational and business insights.

2. Key Features, User Interface, and Navigation

The Control Room interface is designed for accessibility via a standard web browser. The navigation is typically organized via a left-hand sidebar menu.

Key Interface Modules

  1. Dashboard:
    • Home Dashboard: Provides a visual snapshot of the automation program, including total bots, accumulated time saved, and success/failure rates.
    • Devices Dashboard: Shows the status of Bot Runners and Bot Creators (Connected, Disconnected, Offline).
    • Audit Dashboard: Displays recent activities for compliance monitoring.
  2. Activity:
    • In Progress: View currently running automations.
    • Scheduled: View and manage upcoming bot runs.
    • Historical: Review past execution logs.
  3. Bots (Automation):
    • My Bots: The workspace for Bot Creators (Private repository).
    • Public: The centralized repository for production-ready bots (Public repository).
    • Credentials: Access to the Credential Vault.
  4. Devices:
    • Manages the machines (Bot Runners/Creators) connected to the Control Room.
  5. Workload:
    • Manages Workload Management (WLM) queues for distributing work items across multiple bots.
  6. Administration:
    • Settings for licenses, email notifications, users, roles, and security policies.

The Repository Model

  • Private Repository: Accessible only to the specific user (Bot Creator). Bots here are in development.
  • Public Repository: Accessible to other users based on permissions. Bots must be "Checked In" from Private to Public to be deployed or shared.

3. User Management: Roles, Permissions, and Access Control

Automation Anywhere uses a hierarchical user management system to ensure security and segregation of duties.

User Roles

A Role is a collection of permissions. Users are assigned roles, not individual permissions.

  1. System-Defined Roles (Out-of-the-box):
    • AAE_Admin: Super user with full access to settings, users, and licensing.
    • AAE_Basic: Standard user (often used for Bot Runners).
    • AAE_Bot Developer: Has permissions to create and edit bots.
    • AAE_Bot Runner: Has permissions to execute bots but not edit them.
    • AAE_Locker Admin: Manages the Credential Vault lockers.
  2. Custom Roles: Administrators can create specific roles (e.g., "Finance Dept Runner") to restrict access to specific folders or bots.

User Types (Licenses)

  • Bot Creator: A user with a development license to build and test bots.
  • Bot Runner (Attended): A user who triggers bots on their local machine to assist with tasks.
  • Bot Runner (Unattended): A server-level user where bots run automatically via schedule/trigger without human intervention.

RBAC (Role-Based Access Control)

RBAC is the methodology used to restrict system access to authorized users.

  • Principle: Permissions are assigned to roles Roles are assigned to users.
  • Granularity: Permissions can be set at the folder level (e.g., User A can see the "HR Bots" folder but not the "Finance Bots" folder).

4. Bot Deployment, Scheduling, and Triggering

Once a bot is developed, it must be deployed to a Bot Runner. This is managed through the Control Room.

Bot Lifecycle (Check-in/Check-out)

  1. Check-In: A developer moves a bot from their Private repository to the Public repository. This creates a version history.
  2. Check-Out: A developer moves a bot from Public to Private to make edits. This locks the file in Public so others cannot edit it simultaneously.

Deployment Methods

  1. Run Now: Immediate execution of a bot on a selected device.
  2. Schedule:
    • One-time: Run once at a specific date/time.
    • Recurring: Run daily, weekly, or monthly (e.g., "Every Friday at 5 PM").
    • Allows handling of time zones and "missed run" policies (e.g., if the machine was off, should it run immediately upon boot?).
  3. Triggering:
    • Bots execute based on external events rather than time.
    • Types of Triggers: File creation (running a bot when a CSV is dropped in a folder), Email arrival, Service start/stop, Window open/close.

Workload Management (WLM)

For high-volume processing, WLM allows the Control Room to distribute work items (e.g., 10,000 invoices) from a Queue across a pool of Bot Runners dynamically.


5. Bot Insights: Monitoring and Reporting

Bot Insights is the integrated analytics engine that provides real-time visibility into the digital workforce.

Types of Dashboards

  1. Operational Dashboard:
    • Focuses on the health of the system.
    • Metrics: CPU utilization, memory usage, bot heartbeat, success vs. failure counts, average execution time.
    • Audience: IT Support, RPA Center of Excellence (CoE).
  2. Business Dashboard:
    • Focuses on the value generated by the bots.
    • Metrics: Total invoices processed, total dollar value handled, hours saved (converted to ROI).
    • Audience: Business Managers, Stakeholders.

Logging and Reporting

  • Audit Logs: Records every action taken in the Control Room (User login, Bot creation, Bot deployment, User modification). Essential for compliance.
  • Task Logs: Detailed step-by-step logs of bot execution (Start time, End time, Line number of error).
  • Snapshots: Upon failure, the Control Room can capture a screenshot of the Bot Runner's desktop to aid debugging.

6. Security: Credential Vault and Compliance

Security is the most critical component of Enterprise RPA, as bots often handle sensitive data (passwords, PII, financial data).

Credential Vault

The Credential Vault is a secure, centralized storage facility for sensitive information. It ensures that credentials (usernames/passwords) are not hard-coded inside the bot scripts.

Architecture of the Vault

  1. Credential: The actual key-value pair (e.g., Key: SAP_Login, Username: BotUser, Password: ***).
  2. Locker: A logical container that groups credentials together (e.g., "Finance Locker", "HR Locker").
  3. Attributes: Specific details within a credential (URL, Hostname, Password).

Vault Roles

  • Locker Admin: Can create lockers and assign owners. Cannot see the passwords inside.
  • Locker Owner: Can add credentials to the locker and grant access to consumers.
  • Locker Consumer: Can use the credentials within a bot (runtime access) but cannot view the password text.
  • Locker Participant: Can view the credentials (used for developers who need to verify details).

Security Architecture Layers

  1. Network Security: Control Room communicates with Bot Runners via TLS 1.2 (HTTPS/WSS).
  2. Data at Rest: All data in the database and Credential Vault is encrypted (AES-256).
  3. Application Security: RBAC, Password policies, Two-Factor Authentication (2FA), and SAML (SSO) integration.

7. Compliance and Best Practices

Compliance

RPA must adhere to regulations like GDPR, SOX, and HIPAA.

  • Non-Repudiation: The Audit Log ensures that actions cannot be denied by the user who performed them.
  • Version Control: Keeps a history of bot changes to prove that the code running in production is the approved code.
  • Segregation of Duties: Ensure the person who develops the bot (Dev) is not the same person who approves it for production (Admin).

Security Best Practices

  1. Never Hardcode Credentials: Always use the Credential Vault.
  2. Least Privilege Principle: Give users only the minimum permissions necessary to perform their job.
  3. Separate Environments: Maintain distinct Control Room environments for Development, Testing (UAT), and Production.
  4. Regular Rotation: Automate the rotation of passwords stored in the Credential Vault.
  5. Secure Recording: Disable "Secure Recording Mode" or exclude sensitive applications during recording to prevent capturing PII in screenshots.

8. Real-World Use Cases

Use Case 1: Financial Close Process (Scheduling)

  • Scenario: At the end of every month, the finance team must download bank statements and reconcile them with the ERP.
  • Implementation: A bot is scheduled in the Control Room to run at 11:00 PM on the last day of every month.
  • Control Room Feature: Scheduled Deployment.

Use Case 2: Employee Onboarding (Triggering & Security)

  • Scenario: When a new hire form is dropped into a shared folder, IT needs to create accounts in Active Directory and Salesforce.
  • Implementation: A trigger monitors the folder. When the file arrives, the bot launches. It retrieves the Salesforce admin password from the Credential Vault to log in securely.
  • Control Room Feature: File Trigger and Credential Vault.

Use Case 3: Invoice Processing (Workload Management)

  • Scenario: A company receives 5,000 invoices on Monday morning. One bot takes too long to process them.
  • Implementation: The invoices are uploaded to a Control Room Workload Queue. A pool of 10 Bot Runners connects to the queue and processes the invoices in parallel.
  • Control Room Feature: Workload Management (WLM).