Back to Security Management Main Page
Excerpt | ||
---|---|---|
| ||
Find out how to create a new Security Profile |
Learn to work with Security Profiles |
Panel | ||||
---|---|---|---|---|
| ||||
Table of Contents
|
Navigating to Security Profiles
Info |
---|
Finance Application > Security Management > Manage Security Profiles |
Explaining Security Profiles Fields
Name | Description |
---|---|
Name* | The security profile name |
Alternative code* | The security profile alternative code |
Description | A description of the security profile |
Module information* | Includes the following:
|
Related features | Lists all features which are provided by the selected module |
Suggested additional configuration | Lists other areas of the system that are related with the selected module, as a suggestion for additional configuration |
Available menu options | Lists all Main Menu options and Shortcut Menu options and provides the capability to allow or deny access on each one of them |
Common processes | Lists all common processes related with the selected module and provides the capability to allow or deny access on each one of them |
Additional processes | Lists all additional processes related with the selected module and provides the capability to allow or deny access on each one of them |
Custom processes | Lists all custom processes related with the selected module and provides the capability to allow or deny access on each one of them |
Web API methods | Lists all Web API methods related with the selected module and provides the capability to allow or deny access on each one of them |
Reports | Lists all reports related with the selected module and provides the capability to allow or deny access on each one of them |
Printouts | Lists all printouts related with the selected module and provides the capability to allow or deny access on each one of them |
Interfaces | Lists all interfaces related with the selected module and provides the capability to allow or deny access on each one of them |
Dashboards | Lists all dashboards related with the selected module and provides the capability to allow or deny access on each one of them |
Inherited security profiles | Lists all security profiles which are inherited by the specific security profile |
Creating & Saving, Validations & Restrictions
Action | Validations |
---|---|
General | N/A |
Create |
|
Edit | N/A |
Delete |
|
Save |
|
Creating a Security Profile
MAIN INFORMATION
- Provide the required Informatino
- Name
- Alternative Code
- Description
INHERITED SECURITY PROFILES
Click on ADD to select Security Profiles Inherited by This Security Profile
Info Inherited Security profiles will override configuration made on the existing Security Profile being created. For example if a security profile for team leaders does not allow access to any module configuration, then the security profile for team members, which extends the team leaders security profile will also not have access to any module configuration, even if it is defined within that profile that access is allowed.
Inherited Security Profiles are helpful when the intention is to create a new Security Profile that will have additional Restrictions to ones from an existing Security Profile. Read below to find out how you can quickly create a new Security Profile Inheriting Restrictions from another.
MENU ACCESS
MAIN MENU
Through the available main menu items select the ones to ALLOW or DENY ACCESS using the relative buttons
Info |
---|
If inherited profiles exist then items may be shown as allowed but they may be denied by the inherited profile. |
SHORTCUTS MENU
Through the available shortcut menu items select the ones to ALLOW or DENY ACCESS using the relative buttons
Info |
---|
If inherited profiles exist then some shortcut menus may be shown as allowed but they may be denied by the inherited profile. |
MODULE ACCESS
There is a list with all the modules available on the left hand side of the screen
Filter the list of the available modules, by selecting an application, through the filters list which is available on top of the list of modules.
Use the list of modules to select one of them and define the following processes available.
Common Processes
Additional Processes
Custom Processes
Web API
Reports
Dashboards
Interfaces
Printouts
Select the ones to ALLOW or DENY ACCESS using the relative buttons
Info |
---|
If inherited profiles exist then some modules may be shown as allowed but they may be denied by the inherited profile |
Click on SAVE
LOG INFORMATION
The following information is automatically set by the system on saving the Security Profiles
Note |
---|
Visit Understanding Security Profiles for business examples related to Security Profiles |
FOUNDATION > SECURITY MANAGEMENT > MANAGE SECURITY PROFILES |
Using Security Profiles
Security Profiles provide information related to the access of Modules and features by users. For example, they determine whether a Menu Option is available on the Left Menu and if the 'New' button is available for Subscriptions in the Data Entry page.
Security Profiles are then assigned to Users and determine the respective Modules and features each User will have access to when logging into the System.
- Navigate to Security Profiles and explore existing entries via the Summary page.
- Click on the link (Name or Number) of the entry of your interest to enter the Data Entry page and see more detail.
- Use the Actions Menu to create a NEW Security Profile, modify (EDIT) or DELETE an existing one.
- Use BACK to return to the Summary page and CANCEL to revert any unwanted changes made to the Security Profile.
- Click on View Active Users to view the Users that are using the specific Security Profiles.
View the Attributes Table below for a comprehensive description of the Security Profiles fields. Check the Validations Table for a list of available Actions and their related validations when working with Security Profiles.
Anchor | ||||
---|---|---|---|---|
|
Action | Validations |
---|---|
Create |
|
Edit |
|
Delete |
|
Anchor | ||||
---|---|---|---|---|
|
An * indicates a field is mandatory.
Name | Description | ||
---|---|---|---|
Main Information | |||
Name* | The Security Profile name. | ||
Number of Active Users | A Read-only value that provides the number of 'Active' users that use the specific Security Profile. | ||
Alternative Code* | The alternative code of the Security Profile. | ||
Description | A description of the Security Profile. | ||
Inherited Security Profiles | |||
Inherited Security Profiles | Lists all Security Profiles which are inherited by the specific Security Profile.
| ||
Menu Access | |||
Main Menu | |||
Available Menu Options | 'Deny' or 'Allow' access to Main Menu options.
| ||
Shortcuts Menu | |||
Shortcuts Menu | 'Deny' or 'Allow' access to Shortcut Menu options. | ||
Module Access | |||
Module Information* | Selecting a specific module loads its security settings.
| ||
Common Processes | 'Deny' or 'Allow' access to each module's Common Processes, which include:
| ||
Additional Processes | 'Deny' or 'Allow' access to each module's Additional Processes, which include Actions available in the Actions Menu of the 'Manage Module' page and Common Processes and Actions of all Configuration Modules of the specific Entity.
| ||
Custom Processes | 'Deny' or 'Allow' access to each module's Custom Processes, which include any processes that are not inluded as standard with the software Release but have been explicitly implemented for an Organisation. | ||
Web API Methods | 'Deny' or 'Allow' access to WEB APIs available for each module. | ||
Reports | 'Deny' or 'Allow' access to Reports available for each module. | ||
Printouts | 'Deny' or 'Allow' access to Printouts available for each module.
| ||
Interfaces | 'Deny' or 'Allow' access to Interfaces available for each module, such as Kettle, which are not inluded as standard with the software Release (like Custom Processes). Such Interfaces are available only if requested by an Organisation and can be found under Using Pentaho Exports or Using Pentaho Imports. | ||
Dashboards | 'Deny' or 'Allow' access to the Dashboards available for each module. | ||
Log Information | |||
Log Details | The standard set of Log Details information available in all entities. |
Panel | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
Related Areas
|
Panel | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||
Popular Labels | ||||||||||
spaceKey | V4Manual | style | heatmap||||||||
Helpful Links
|